Results 21 to 30 of about 849,579 (245)
Resilient Misbehaviour Detection MAC Protocol (MD-MAC) for Distributed Wireless Networks [PDF]
Chaminda Alocious, Hannan Xiao, B. Christianson, 'Resilient Misbehaviour Detection MAC Protocol (MD-MAC) for Distributed Wireless Networks' paper presented at the 2016 IEEE Wireless Communications and Networking Conference (IEEE WCNC). Doha, Qatar.
Alocious, Chaminda +2 more
core +2 more sources
Technical challenges for identification in mobile environments [PDF]
This report describes technical challenges and requirements for identification of individuals in mobile (i.e. non-stationary) environments as e.g. required by the ¿European Mobile Identification Interoperability Group¿ (MOBIDIG).
KEUS Klaus, LOESCHNER Jan
core +1 more source
LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile ...
Beheshti, A. A., Toorani, M.
core +3 more sources
Mobile identification: from functional requirements, to testing for interoperability and security [PDF]
The present document provides an analysis of the technical, functional and interoperability requirements for a generic mobile identification solution. The report starts from the findings and discussions held so far in the context of the e-MOBIDIG working
ALESSANDRONI Alessandro, RANA Antonia
core +1 more source
BackgroundThere is increased research interest in the use of mobile phone apps to support diabetes management. However, there are divergent views on what constitute the minimum standards for inclusion in the development of mobile phone apps. Mobile phone
Adu, Mary D +4 more
doaj +1 more source
Augmented PIN Authentication through Behavioral Biometrics
Personal Identification Numbers (PINs) are widely used today for user authentication on mobile devices. However, this authentication method can be subject to several attacks such as phishing, smudge, and side-channel.
Matteo Nerini +2 more
doaj +1 more source
AN ENHANCED BINDING UPDATE SCHEME FOR NEXT GENERATION INTERNET PROTOCOL MOBILITY [PDF]
In recent years, the usage of mobile devices has become essential for people, both for business and for their daily activities. The mobile devices can get services directly from their home network and from other correspondent devices regardless of their ...
SENTHILKUMAR MATHI, M. L. VALARMATHI
doaj
A Survey on Trend and Classification of Internet of Things Reviews
The Internet of Things (IoT) is shaping the current and next generation of the Internet. The vision of IoT is to embed communication capabilities with a highly distributed, ubiquitous and dense heterogeneous devices network.
Azana Hafizah Mohd Aman +4 more
doaj +1 more source
Development of security mechanisms for scada systems in the postquantium period
The formation of new systems based on the synthesis of mobile Internet technologies with cyberspace significantly expands the possibilities of creating smart technologies based on mesh and sensor networks.
О. В. Воропай +3 more
doaj +1 more source
Software for Wearable Devices: Challenges and Opportunities
Wearable devices are a new form of mobile computer system that provides exclusive and user-personalized services. Wearable devices bring new issues and challenges to computer science and technology.
Chen, Xin +5 more
core +1 more source

