Artículos de revistas sobre el tema "Secured ubiquitous services"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Secured ubiquitous services".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Ogbodo, Emmanuel Utochukwu, Adnan M. Abu-Mahfouz y Anish M. Kurien. "A Survey on 5G and LPWAN-IoT for Improved Smart Cities and Remote Area Applications: From the Aspect of Architecture and Security". Sensors 22, n.º 16 (22 de agosto de 2022): 6313. http://dx.doi.org/10.3390/s22166313.
Texto completoBouchemal, Nardjes, Ramdane Maamri y Mohammed Chihoub. "Securing Ambient Agents Groups by Using Verification, Judgment and Surveillance". International Journal of Ambient Computing and Intelligence 5, n.º 3 (julio de 2013): 44–60. http://dx.doi.org/10.4018/ijaci.2013070104.
Texto completoHsu, Ching-Hsien, Jong Hyuk Park, Laurence T. Yang y Mario Freire. "Secure communications and data management in ubiquitous services". International Journal of Communication Systems 22, n.º 9 (septiembre de 2009): 1065–68. http://dx.doi.org/10.1002/dac.1057.
Texto completoKim, Sung-Ki, Jin-Chul Jung, Kyung-No Park y Byoung-Joon Min. "Secure Jini Service Architecture Providing Ubiquitous Services Having Persistent States". KIPS Transactions:PartC 15C, n.º 3 (30 de junio de 2008): 157–66. http://dx.doi.org/10.3745/kipstc.2008.15-c.3.157.
Texto completoHsu, Robert C., Jong Hyuk Park, Laurence T. Yang y Mario Freire. "Call for Papers: ‘Secure Communications and Data Management in Ubiquitous Services’". International Journal of Communication Systems 21, n.º 5 (2008): 569–70. http://dx.doi.org/10.1002/dac.940.
Texto completoZhou, Yousheng y Longan Wang. "A Lattice-Based Authentication Scheme for Roaming Service in Ubiquitous Networks with Anonymity". Security and Communication Networks 2020 (28 de junio de 2020): 1–19. http://dx.doi.org/10.1155/2020/2637916.
Texto completoAbumarshoud, Hanaa, Cheng Chen, Mohamed Sufyan Islim y Harald Haas. "Optical wireless communications for cyber-secure ubiquitous wireless networks". Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 476, n.º 2242 (octubre de 2020): 20200162. http://dx.doi.org/10.1098/rspa.2020.0162.
Texto completoBahl, P., W. Russell, Yi-Min Wang, A. Balachandran, G. M. Voelker y A. Miu. "PAWNs: Satisfying the need for ubiquitos secure connectivity and location services". IEEE Wireless Communications 9, n.º 1 (febrero de 2002): 40–48. http://dx.doi.org/10.1109/mwc.2002.986457.
Texto completoMahmood, Zahid, Huansheng Ning, Ata Ullah y Xuanxia Yao. "Secure Authentication and Prescription Safety Protocol for Telecare Health Services Using Ubiquitous IoT". Applied Sciences 7, n.º 10 (16 de octubre de 2017): 1069. http://dx.doi.org/10.3390/app7101069.
Texto completoJagadamba, G. y B. Sathish Babu. "Context and Trust Based Adaptive Security for Accessing Services in Ubiquitous Computing Environment". International Journal of Systems and Service-Oriented Engineering 6, n.º 4 (octubre de 2016): 1–21. http://dx.doi.org/10.4018/ijssoe.2016100101.
Texto completoLe, Tuan-Vinh. "Securing Group Patient Communication in 6G-Aided Dynamic Ubiquitous Healthcare with Real-Time Mobile DNA Sequencing". Bioengineering 10, n.º 7 (15 de julio de 2023): 839. http://dx.doi.org/10.3390/bioengineering10070839.
Texto completoAdithya, B. y B. Sathish Babu. "Capacity and Service (CapServ) Adaptive Trust Computation by Territory Formation in Ubiquitous Environment". International Journal of Advanced Pervasive and Ubiquitous Computing 4, n.º 4 (octubre de 2012): 7–18. http://dx.doi.org/10.4018/japuc.2012100102.
Texto completoAloisio, Giovanni, Massimo Cafaro, Euro Blasi y Italo Epicoco. "The Grid Resource Broker, A Ubiquitous Grid Computing Framework". Scientific Programming 10, n.º 2 (2002): 113–19. http://dx.doi.org/10.1155/2002/969307.
Texto completoAhmad, Muhammad, Mohammed A. Alqarni, Asad Khan, Adil Khan, Sajjad Hussain Chauhdary, Manuel Mazzara, Tariq Umer y Salvatore Distefano. "Smartwatch-Based Legitimate User Identification for Cloud-Based Secure Services". Mobile Information Systems 2018 (14 de agosto de 2018): 1–14. http://dx.doi.org/10.1155/2018/5107024.
Texto completoYu, Weider D., Jatin Patel, Vishal Mehta y Ashish Joshi. "An Approach to Design a SOA Services Governance Architecture for an u-Healthcare System with Mobility". International Journal of E-Health and Medical Communications 3, n.º 2 (abril de 2012): 36–65. http://dx.doi.org/10.4018/jehmc.2012040103.
Texto completoLuis M. Contreras, Javier Serrano, Lefteris Mamatas, Giacomo Bernini, Paolo Monti, Mario Antunes, Udayanto Atmojo et al. "Modular architecture providing convergent and ubiquitous intelligent connectivity for networks beyond 2030". ITU Journal on Future and Evolving Technologies 3, n.º 3 (8 de diciembre de 2022): 693–709. http://dx.doi.org/10.52953/samo3073.
Texto completoChang, Chin-Chen, Iuon-Chang Lin y Chia-Chi Wu. "A Multipurpose Key Agreement Scheme in Ubiquitous Computing Environments". Mobile Information Systems 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/934716.
Texto completoSánchez, Daniel, Andrés López, Florina Mendoza y Patricia Arias Cabarcos. "DNS-Based Dynamic Authentication for Microservices in IoT". Proceedings 2, n.º 19 (25 de octubre de 2018): 1233. http://dx.doi.org/10.3390/proceedings2191233.
Texto completoXiong, Jinbo, Rong Ma, Lei Chen, Youliang Tian, Li Lin y Biao Jin. "Achieving Incentive, Security, and Scalable Privacy Protection in Mobile Crowdsensing Services". Wireless Communications and Mobile Computing 2018 (12 de agosto de 2018): 1–12. http://dx.doi.org/10.1155/2018/8959635.
Texto completoTariq, Muhammad Atiq Ur Rehman, Cheuk Yin Wai y Nitin Muttil. "Vulnerability Assessment of Ubiquitous Cities Using the Analytic Hierarchy Process". Future Internet 12, n.º 12 (21 de diciembre de 2020): 235. http://dx.doi.org/10.3390/fi12120235.
Texto completoButpheng, Chanapha, Kuo-Hui Yeh y Jia-Li Hou. "A Secure IoT and Cloud Computing-Enabled e-Health Management System". Security and Communication Networks 2022 (2 de junio de 2022): 1–14. http://dx.doi.org/10.1155/2022/5300253.
Texto completoWoon Lee, Sung y Hyunsung Kim. "Privacy-Preserving Authentication Scheme for Roaming Service in Global Mobility Networks". International journal of Computer Networks & Communications 13, n.º 5 (30 de septiembre de 2021): 111–28. http://dx.doi.org/10.5121/ijcnc.2021.13507.
Texto completoKwofie, A. y A. A. Barik. "Cloud Security: Using Advance Encryption Standard Algorithm to Secure Cloud Data at Client Side and Taking Measures to Protect its Secrecy". International Journal of Advance Research and Innovation 8, n.º 3 (2020): 11–14. http://dx.doi.org/10.51976/ijari.832003.
Texto completoEjaz, Muneeb, Tanesh Kumar, Ivana Kovacevic, Mika Ylianttila y Erkki Harjula. "Health-BlockEdge: Blockchain-Edge Framework for Reliable Low-Latency Digital Healthcare Applications". Sensors 21, n.º 7 (3 de abril de 2021): 2502. http://dx.doi.org/10.3390/s21072502.
Texto completoBasha.H, Anwar, S. Amrit Sai, Sanjnah A y Srimathi M. "Cloud Computing: Secure Transmission of High Definition Videos Using Cryptographic Approach". International Journal of Engineering & Technology 7, n.º 2.19 (17 de abril de 2018): 94. http://dx.doi.org/10.14419/ijet.v7i2.19.15057.
Texto completoKoppula, Sumanth y Jayabhaskar Muthukuru. "Secure Digital Signature Scheme Based on Elliptic Curves for Internet of Things". International Journal of Electrical and Computer Engineering (IJECE) 6, n.º 3 (1 de junio de 2016): 1002. http://dx.doi.org/10.11591/ijece.v6i3.9420.
Texto completoKoppula, Sumanth y Jayabhaskar Muthukuru. "Secure Digital Signature Scheme Based on Elliptic Curves for Internet of Things". International Journal of Electrical and Computer Engineering (IJECE) 6, n.º 3 (1 de junio de 2016): 1002. http://dx.doi.org/10.11591/ijece.v6i3.pp1002-1010.
Texto completoFITCH, DANIEL y HAIPING XU. "A RAID-BASED SECURE AND FAULT-TOLERANT MODEL FOR CLOUD INFORMATION STORAGE". International Journal of Software Engineering and Knowledge Engineering 23, n.º 05 (junio de 2013): 627–54. http://dx.doi.org/10.1142/s0218194013400111.
Texto completoUllah, Insaf, Muhammad Asghar Khan, Ali Alkhalifah, Rosdiadee Nordin, Mohammed H. Alsharif, Abdulaziz H. Alghtani y Ayman A. Aly. "A Multi-Message Multi-Receiver Signcryption Scheme with Edge Computing for Secure and Reliable Wireless Internet of Medical Things Communications". Sustainability 13, n.º 23 (28 de noviembre de 2021): 13184. http://dx.doi.org/10.3390/su132313184.
Texto completoMao, Jian, Wenqian Tian, Yan Zhang, Jian Cui, Hanjun Ma, Jingdong Bian, Jianwei Liu y Jianhong Zhang. "Co-Check: Collaborative Outsourced Data Auditing in Multicloud Environment". Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/2948025.
Texto completoJeong, Young-Sik, Jae Dong Lee, Jeong-Bae Lee, Jai-Jin Jung y Jong Hyuk Park. "An Efficient and Securem-IPS Scheme of Mobile Devices for Human-Centric Computing". Journal of Applied Mathematics 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/198580.
Texto completoKim, Semin, Hyung-Jin Mun y Sunghyuck Hong. "Multi-Factor Authentication with Randomly Selected Authentication Methods with DID on a Random Terminal". Applied Sciences 12, n.º 5 (22 de febrero de 2022): 2301. http://dx.doi.org/10.3390/app12052301.
Texto completoLe, Tuan-Vinh. "Cross-Server End-to-End Patient Key Agreement Protocol for DNA-Based U-Healthcare in the Internet of Living Things". Mathematics 11, n.º 7 (28 de marzo de 2023): 1638. http://dx.doi.org/10.3390/math11071638.
Texto completoYu, Binbin y Hongtu Li. "Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things". International Journal of Distributed Sensor Networks 15, n.º 9 (septiembre de 2019): 155014771987937. http://dx.doi.org/10.1177/1550147719879379.
Texto completoShuai, Mengxia, Bin Liu, Nenghai Yu y Ling Xiong. "Lightweight and Secure Three-Factor Authentication Scheme for Remote Patient Monitoring Using On-Body Wireless Networks". Security and Communication Networks 2019 (2 de junio de 2019): 1–14. http://dx.doi.org/10.1155/2019/8145087.
Texto completoDootio, Mazhar Ali, Abdullah Lakhan, Ali Hassan Sodhro, Tor Morten Groenli, Narmeen Zakaria Bawany y Samrat Kumar. "Secure and failure hybrid delay enabled a lightweight RPC and SHDS schemes in Industry 4.0 aware IIoHT enabled fog computing". Mathematical Biosciences and Engineering 19, n.º 1 (2021): 513–36. http://dx.doi.org/10.3934/mbe.2022024.
Texto completoSazu, Mesbaul y Sakila Jahan. "How Big Data Analytics is transforming the finance industry". Bankarstvo 51, n.º 2 (2022): 147–72. http://dx.doi.org/10.5937/bankarstvo2202147h.
Texto completoNawaz, Anum, Jorge Peña Queralta, Jixin Guan, Muhammad Awais, Tuan Nguyen Gia, Ali Kashif Bashir, Haibin Kan y Tomi Westerlund. "Edge Computing to Secure IoT Data Ownership and Trade with the Ethereum Blockchain". Sensors 20, n.º 14 (16 de julio de 2020): 3965. http://dx.doi.org/10.3390/s20143965.
Texto completoKhalfaoui, Sameh, Jean Leneutre, Arthur Villard, Jingxuan Ma y Pascal Urien. "Security Analysis of Out-of-Band Device Pairing Protocols: A Survey". Wireless Communications and Mobile Computing 2021 (28 de enero de 2021): 1–30. http://dx.doi.org/10.1155/2021/8887472.
Texto completoZomignani Barboza, Júlia y Paul De Hert. "Data Protection Impact Assessment: A Protection Tool for Migrants Using ICT Solutions". Social Sciences 10, n.º 12 (6 de diciembre de 2021): 466. http://dx.doi.org/10.3390/socsci10120466.
Texto completoRathod, Tejal, Nilesh Kumar Jadav, Sudeep Tanwar, Ravi Sharma, Amr Tolba, Maria Simona Raboaca, Verdes Marina y Wael Said. "Blockchain-Driven Intelligent Scheme for IoT-Based Public Safety System beyond 5G Networks". Sensors 23, n.º 2 (14 de enero de 2023): 969. http://dx.doi.org/10.3390/s23020969.
Texto completoDr. Pasumponpandian. "Development of Secure Cloud Based Storage Using the Elgamal Hyper Elliptic Curve Cryptography with Fuzzy Logic Based Integer Selection". Journal of Soft Computing Paradigm 2, n.º 1 (15 de marzo de 2020): 24–35. http://dx.doi.org/10.36548/jscp.2020.1.003.
Texto completoDíaz-Sánchez, Daniel, Andrés Marín-Lopez, Florina Almenárez Mendoza y Patricia Arias Cabarcos. "DNS/DANE Collision-Based Distributed and Dynamic Authentication for Microservices in IoT †". Sensors 19, n.º 15 (26 de julio de 2019): 3292. http://dx.doi.org/10.3390/s19153292.
Texto completoZhao, Dawei, Haipeng Peng, Lixiang Li, Yixian Yang y Shudong Li. "An Efficient Patch Dissemination Strategy for Mobile Networks". Mathematical Problems in Engineering 2013 (2013): 1–13. http://dx.doi.org/10.1155/2013/896187.
Texto completoFarooq, Muhammad Shoaib, Shamyla Riaz, Rabia Tehseen, Uzma Farooq y Khalid Saleem. "Role of Internet of things in diabetes healthcare: Network infrastructure, taxonomy, challenges, and security model". DIGITAL HEALTH 9 (enero de 2023): 205520762311790. http://dx.doi.org/10.1177/20552076231179056.
Texto completoOrucho, Daniel Okari, Fredrick Mzee Awuor, Ratemo Makiya y Collins Oduor. "An Enhanced Data Transmission in Mobile Banking Using LSB-AES Algorithm". Asian Journal of Research in Computer Science 16, n.º 1 (3 de junio de 2023): 43–56. http://dx.doi.org/10.9734/ajrcos/2023/v16i1334.
Texto completoShetty, Sharan y Sarala Mary. "Cloud Drops Technology Application in Cloud Computing". Research & Review: Machine Learning and Cloud Computing 1, n.º 2 (1 de julio de 2022): 34–38. http://dx.doi.org/10.46610/rrmlcc.2022.v01i02.006.
Texto completoLee, Kyuin, Yucheng Yang, Omkar Prabhune, Aishwarya Lekshmi Chithra, Jack West, Kassem Fawaz, Neil Klingensmith, Suman Banerjee y Younghyun Kim. "AEROKEY". Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, n.º 1 (29 de marzo de 2022): 1–29. http://dx.doi.org/10.1145/3517254.
Texto completoStukalenko, Elena. "Risks of the Digitalization of Life of the Population and Ways of Decreasing Them". Ideas and Ideals 13, n.º 4-1 (27 de diciembre de 2021): 180–203. http://dx.doi.org/10.17212/2075-0862-2021-13.4.1-180-203.
Texto completoHe, Changyang, Lu He, Zhicong Lu y Bo Li. ""I Have to Use My Son's QR Code to Run the Business": Unpacking Senior Street Vendors' Challenges in Mobile Money Collection in China". Proceedings of the ACM on Human-Computer Interaction 7, CSCW1 (14 de abril de 2023): 1–28. http://dx.doi.org/10.1145/3579493.
Texto completo