Journal articles on the topic 'Secured ubiquitous services'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Secured ubiquitous services.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ogbodo, Emmanuel Utochukwu, Adnan M. Abu-Mahfouz, and Anish M. Kurien. "A Survey on 5G and LPWAN-IoT for Improved Smart Cities and Remote Area Applications: From the Aspect of Architecture and Security." Sensors 22, no. 16 (August 22, 2022): 6313. http://dx.doi.org/10.3390/s22166313.
Full textBouchemal, Nardjes, Ramdane Maamri, and Mohammed Chihoub. "Securing Ambient Agents Groups by Using Verification, Judgment and Surveillance." International Journal of Ambient Computing and Intelligence 5, no. 3 (July 2013): 44–60. http://dx.doi.org/10.4018/ijaci.2013070104.
Full textHsu, Ching-Hsien, Jong Hyuk Park, Laurence T. Yang, and Mario Freire. "Secure communications and data management in ubiquitous services." International Journal of Communication Systems 22, no. 9 (September 2009): 1065–68. http://dx.doi.org/10.1002/dac.1057.
Full textKim, Sung-Ki, Jin-Chul Jung, Kyung-No Park, and Byoung-Joon Min. "Secure Jini Service Architecture Providing Ubiquitous Services Having Persistent States." KIPS Transactions:PartC 15C, no. 3 (June 30, 2008): 157–66. http://dx.doi.org/10.3745/kipstc.2008.15-c.3.157.
Full textHsu, Robert C., Jong Hyuk Park, Laurence T. Yang, and Mario Freire. "Call for Papers: ‘Secure Communications and Data Management in Ubiquitous Services’." International Journal of Communication Systems 21, no. 5 (2008): 569–70. http://dx.doi.org/10.1002/dac.940.
Full textZhou, Yousheng, and Longan Wang. "A Lattice-Based Authentication Scheme for Roaming Service in Ubiquitous Networks with Anonymity." Security and Communication Networks 2020 (June 28, 2020): 1–19. http://dx.doi.org/10.1155/2020/2637916.
Full textAbumarshoud, Hanaa, Cheng Chen, Mohamed Sufyan Islim, and Harald Haas. "Optical wireless communications for cyber-secure ubiquitous wireless networks." Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 476, no. 2242 (October 2020): 20200162. http://dx.doi.org/10.1098/rspa.2020.0162.
Full textBahl, P., W. Russell, Yi-Min Wang, A. Balachandran, G. M. Voelker, and A. Miu. "PAWNs: Satisfying the need for ubiquitos secure connectivity and location services." IEEE Wireless Communications 9, no. 1 (February 2002): 40–48. http://dx.doi.org/10.1109/mwc.2002.986457.
Full textMahmood, Zahid, Huansheng Ning, Ata Ullah, and Xuanxia Yao. "Secure Authentication and Prescription Safety Protocol for Telecare Health Services Using Ubiquitous IoT." Applied Sciences 7, no. 10 (October 16, 2017): 1069. http://dx.doi.org/10.3390/app7101069.
Full textJagadamba, G., and B. Sathish Babu. "Context and Trust Based Adaptive Security for Accessing Services in Ubiquitous Computing Environment." International Journal of Systems and Service-Oriented Engineering 6, no. 4 (October 2016): 1–21. http://dx.doi.org/10.4018/ijssoe.2016100101.
Full textLe, Tuan-Vinh. "Securing Group Patient Communication in 6G-Aided Dynamic Ubiquitous Healthcare with Real-Time Mobile DNA Sequencing." Bioengineering 10, no. 7 (July 15, 2023): 839. http://dx.doi.org/10.3390/bioengineering10070839.
Full textAdithya, B., and B. Sathish Babu. "Capacity and Service (CapServ) Adaptive Trust Computation by Territory Formation in Ubiquitous Environment." International Journal of Advanced Pervasive and Ubiquitous Computing 4, no. 4 (October 2012): 7–18. http://dx.doi.org/10.4018/japuc.2012100102.
Full textAloisio, Giovanni, Massimo Cafaro, Euro Blasi, and Italo Epicoco. "The Grid Resource Broker, A Ubiquitous Grid Computing Framework." Scientific Programming 10, no. 2 (2002): 113–19. http://dx.doi.org/10.1155/2002/969307.
Full textAhmad, Muhammad, Mohammed A. Alqarni, Asad Khan, Adil Khan, Sajjad Hussain Chauhdary, Manuel Mazzara, Tariq Umer, and Salvatore Distefano. "Smartwatch-Based Legitimate User Identification for Cloud-Based Secure Services." Mobile Information Systems 2018 (August 14, 2018): 1–14. http://dx.doi.org/10.1155/2018/5107024.
Full textYu, Weider D., Jatin Patel, Vishal Mehta, and Ashish Joshi. "An Approach to Design a SOA Services Governance Architecture for an u-Healthcare System with Mobility." International Journal of E-Health and Medical Communications 3, no. 2 (April 2012): 36–65. http://dx.doi.org/10.4018/jehmc.2012040103.
Full textLuis M. Contreras, Javier Serrano, Lefteris Mamatas, Giacomo Bernini, Paolo Monti, Mario Antunes, Udayanto Atmojo, et al. "Modular architecture providing convergent and ubiquitous intelligent connectivity for networks beyond 2030." ITU Journal on Future and Evolving Technologies 3, no. 3 (December 8, 2022): 693–709. http://dx.doi.org/10.52953/samo3073.
Full textChang, Chin-Chen, Iuon-Chang Lin, and Chia-Chi Wu. "A Multipurpose Key Agreement Scheme in Ubiquitous Computing Environments." Mobile Information Systems 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/934716.
Full textSánchez, Daniel, Andrés López, Florina Mendoza, and Patricia Arias Cabarcos. "DNS-Based Dynamic Authentication for Microservices in IoT." Proceedings 2, no. 19 (October 25, 2018): 1233. http://dx.doi.org/10.3390/proceedings2191233.
Full textXiong, Jinbo, Rong Ma, Lei Chen, Youliang Tian, Li Lin, and Biao Jin. "Achieving Incentive, Security, and Scalable Privacy Protection in Mobile Crowdsensing Services." Wireless Communications and Mobile Computing 2018 (August 12, 2018): 1–12. http://dx.doi.org/10.1155/2018/8959635.
Full textTariq, Muhammad Atiq Ur Rehman, Cheuk Yin Wai, and Nitin Muttil. "Vulnerability Assessment of Ubiquitous Cities Using the Analytic Hierarchy Process." Future Internet 12, no. 12 (December 21, 2020): 235. http://dx.doi.org/10.3390/fi12120235.
Full textButpheng, Chanapha, Kuo-Hui Yeh, and Jia-Li Hou. "A Secure IoT and Cloud Computing-Enabled e-Health Management System." Security and Communication Networks 2022 (June 2, 2022): 1–14. http://dx.doi.org/10.1155/2022/5300253.
Full textWoon Lee, Sung, and Hyunsung Kim. "Privacy-Preserving Authentication Scheme for Roaming Service in Global Mobility Networks." International journal of Computer Networks & Communications 13, no. 5 (September 30, 2021): 111–28. http://dx.doi.org/10.5121/ijcnc.2021.13507.
Full textKwofie, A., and A. A. Barik. "Cloud Security: Using Advance Encryption Standard Algorithm to Secure Cloud Data at Client Side and Taking Measures to Protect its Secrecy." International Journal of Advance Research and Innovation 8, no. 3 (2020): 11–14. http://dx.doi.org/10.51976/ijari.832003.
Full textEjaz, Muneeb, Tanesh Kumar, Ivana Kovacevic, Mika Ylianttila, and Erkki Harjula. "Health-BlockEdge: Blockchain-Edge Framework for Reliable Low-Latency Digital Healthcare Applications." Sensors 21, no. 7 (April 3, 2021): 2502. http://dx.doi.org/10.3390/s21072502.
Full textBasha.H, Anwar, S. Amrit Sai, Sanjnah A, and Srimathi M. "Cloud Computing: Secure Transmission of High Definition Videos Using Cryptographic Approach." International Journal of Engineering & Technology 7, no. 2.19 (April 17, 2018): 94. http://dx.doi.org/10.14419/ijet.v7i2.19.15057.
Full textKoppula, Sumanth, and Jayabhaskar Muthukuru. "Secure Digital Signature Scheme Based on Elliptic Curves for Internet of Things." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 3 (June 1, 2016): 1002. http://dx.doi.org/10.11591/ijece.v6i3.9420.
Full textKoppula, Sumanth, and Jayabhaskar Muthukuru. "Secure Digital Signature Scheme Based on Elliptic Curves for Internet of Things." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 3 (June 1, 2016): 1002. http://dx.doi.org/10.11591/ijece.v6i3.pp1002-1010.
Full textFITCH, DANIEL, and HAIPING XU. "A RAID-BASED SECURE AND FAULT-TOLERANT MODEL FOR CLOUD INFORMATION STORAGE." International Journal of Software Engineering and Knowledge Engineering 23, no. 05 (June 2013): 627–54. http://dx.doi.org/10.1142/s0218194013400111.
Full textUllah, Insaf, Muhammad Asghar Khan, Ali Alkhalifah, Rosdiadee Nordin, Mohammed H. Alsharif, Abdulaziz H. Alghtani, and Ayman A. Aly. "A Multi-Message Multi-Receiver Signcryption Scheme with Edge Computing for Secure and Reliable Wireless Internet of Medical Things Communications." Sustainability 13, no. 23 (November 28, 2021): 13184. http://dx.doi.org/10.3390/su132313184.
Full textMao, Jian, Wenqian Tian, Yan Zhang, Jian Cui, Hanjun Ma, Jingdong Bian, Jianwei Liu, and Jianhong Zhang. "Co-Check: Collaborative Outsourced Data Auditing in Multicloud Environment." Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/2948025.
Full textJeong, Young-Sik, Jae Dong Lee, Jeong-Bae Lee, Jai-Jin Jung, and Jong Hyuk Park. "An Efficient and Securem-IPS Scheme of Mobile Devices for Human-Centric Computing." Journal of Applied Mathematics 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/198580.
Full textKim, Semin, Hyung-Jin Mun, and Sunghyuck Hong. "Multi-Factor Authentication with Randomly Selected Authentication Methods with DID on a Random Terminal." Applied Sciences 12, no. 5 (February 22, 2022): 2301. http://dx.doi.org/10.3390/app12052301.
Full textLe, Tuan-Vinh. "Cross-Server End-to-End Patient Key Agreement Protocol for DNA-Based U-Healthcare in the Internet of Living Things." Mathematics 11, no. 7 (March 28, 2023): 1638. http://dx.doi.org/10.3390/math11071638.
Full textYu, Binbin, and Hongtu Li. "Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things." International Journal of Distributed Sensor Networks 15, no. 9 (September 2019): 155014771987937. http://dx.doi.org/10.1177/1550147719879379.
Full textShuai, Mengxia, Bin Liu, Nenghai Yu, and Ling Xiong. "Lightweight and Secure Three-Factor Authentication Scheme for Remote Patient Monitoring Using On-Body Wireless Networks." Security and Communication Networks 2019 (June 2, 2019): 1–14. http://dx.doi.org/10.1155/2019/8145087.
Full textDootio, Mazhar Ali, Abdullah Lakhan, Ali Hassan Sodhro, Tor Morten Groenli, Narmeen Zakaria Bawany, and Samrat Kumar. "Secure and failure hybrid delay enabled a lightweight RPC and SHDS schemes in Industry 4.0 aware IIoHT enabled fog computing." Mathematical Biosciences and Engineering 19, no. 1 (2021): 513–36. http://dx.doi.org/10.3934/mbe.2022024.
Full textSazu, Mesbaul, and Sakila Jahan. "How Big Data Analytics is transforming the finance industry." Bankarstvo 51, no. 2 (2022): 147–72. http://dx.doi.org/10.5937/bankarstvo2202147h.
Full textNawaz, Anum, Jorge Peña Queralta, Jixin Guan, Muhammad Awais, Tuan Nguyen Gia, Ali Kashif Bashir, Haibin Kan, and Tomi Westerlund. "Edge Computing to Secure IoT Data Ownership and Trade with the Ethereum Blockchain." Sensors 20, no. 14 (July 16, 2020): 3965. http://dx.doi.org/10.3390/s20143965.
Full textKhalfaoui, Sameh, Jean Leneutre, Arthur Villard, Jingxuan Ma, and Pascal Urien. "Security Analysis of Out-of-Band Device Pairing Protocols: A Survey." Wireless Communications and Mobile Computing 2021 (January 28, 2021): 1–30. http://dx.doi.org/10.1155/2021/8887472.
Full textZomignani Barboza, Júlia, and Paul De Hert. "Data Protection Impact Assessment: A Protection Tool for Migrants Using ICT Solutions." Social Sciences 10, no. 12 (December 6, 2021): 466. http://dx.doi.org/10.3390/socsci10120466.
Full textRathod, Tejal, Nilesh Kumar Jadav, Sudeep Tanwar, Ravi Sharma, Amr Tolba, Maria Simona Raboaca, Verdes Marina, and Wael Said. "Blockchain-Driven Intelligent Scheme for IoT-Based Public Safety System beyond 5G Networks." Sensors 23, no. 2 (January 14, 2023): 969. http://dx.doi.org/10.3390/s23020969.
Full textDr. Pasumponpandian. "Development of Secure Cloud Based Storage Using the Elgamal Hyper Elliptic Curve Cryptography with Fuzzy Logic Based Integer Selection." Journal of Soft Computing Paradigm 2, no. 1 (March 15, 2020): 24–35. http://dx.doi.org/10.36548/jscp.2020.1.003.
Full textDíaz-Sánchez, Daniel, Andrés Marín-Lopez, Florina Almenárez Mendoza, and Patricia Arias Cabarcos. "DNS/DANE Collision-Based Distributed and Dynamic Authentication for Microservices in IoT †." Sensors 19, no. 15 (July 26, 2019): 3292. http://dx.doi.org/10.3390/s19153292.
Full textZhao, Dawei, Haipeng Peng, Lixiang Li, Yixian Yang, and Shudong Li. "An Efficient Patch Dissemination Strategy for Mobile Networks." Mathematical Problems in Engineering 2013 (2013): 1–13. http://dx.doi.org/10.1155/2013/896187.
Full textFarooq, Muhammad Shoaib, Shamyla Riaz, Rabia Tehseen, Uzma Farooq, and Khalid Saleem. "Role of Internet of things in diabetes healthcare: Network infrastructure, taxonomy, challenges, and security model." DIGITAL HEALTH 9 (January 2023): 205520762311790. http://dx.doi.org/10.1177/20552076231179056.
Full textOrucho, Daniel Okari, Fredrick Mzee Awuor, Ratemo Makiya, and Collins Oduor. "An Enhanced Data Transmission in Mobile Banking Using LSB-AES Algorithm." Asian Journal of Research in Computer Science 16, no. 1 (June 3, 2023): 43–56. http://dx.doi.org/10.9734/ajrcos/2023/v16i1334.
Full textShetty, Sharan, and Sarala Mary. "Cloud Drops Technology Application in Cloud Computing." Research & Review: Machine Learning and Cloud Computing 1, no. 2 (July 1, 2022): 34–38. http://dx.doi.org/10.46610/rrmlcc.2022.v01i02.006.
Full textLee, Kyuin, Yucheng Yang, Omkar Prabhune, Aishwarya Lekshmi Chithra, Jack West, Kassem Fawaz, Neil Klingensmith, Suman Banerjee, and Younghyun Kim. "AEROKEY." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, no. 1 (March 29, 2022): 1–29. http://dx.doi.org/10.1145/3517254.
Full textStukalenko, Elena. "Risks of the Digitalization of Life of the Population and Ways of Decreasing Them." Ideas and Ideals 13, no. 4-1 (December 27, 2021): 180–203. http://dx.doi.org/10.17212/2075-0862-2021-13.4.1-180-203.
Full textHe, Changyang, Lu He, Zhicong Lu, and Bo Li. ""I Have to Use My Son's QR Code to Run the Business": Unpacking Senior Street Vendors' Challenges in Mobile Money Collection in China." Proceedings of the ACM on Human-Computer Interaction 7, CSCW1 (April 14, 2023): 1–28. http://dx.doi.org/10.1145/3579493.
Full text