Artykuły w czasopismach na temat „Secured ubiquitous services”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Secured ubiquitous services”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Ogbodo, Emmanuel Utochukwu, Adnan M. Abu-Mahfouz i Anish M. Kurien. "A Survey on 5G and LPWAN-IoT for Improved Smart Cities and Remote Area Applications: From the Aspect of Architecture and Security". Sensors 22, nr 16 (22.08.2022): 6313. http://dx.doi.org/10.3390/s22166313.
Pełny tekst źródłaBouchemal, Nardjes, Ramdane Maamri i Mohammed Chihoub. "Securing Ambient Agents Groups by Using Verification, Judgment and Surveillance". International Journal of Ambient Computing and Intelligence 5, nr 3 (lipiec 2013): 44–60. http://dx.doi.org/10.4018/ijaci.2013070104.
Pełny tekst źródłaHsu, Ching-Hsien, Jong Hyuk Park, Laurence T. Yang i Mario Freire. "Secure communications and data management in ubiquitous services". International Journal of Communication Systems 22, nr 9 (wrzesień 2009): 1065–68. http://dx.doi.org/10.1002/dac.1057.
Pełny tekst źródłaKim, Sung-Ki, Jin-Chul Jung, Kyung-No Park i Byoung-Joon Min. "Secure Jini Service Architecture Providing Ubiquitous Services Having Persistent States". KIPS Transactions:PartC 15C, nr 3 (30.06.2008): 157–66. http://dx.doi.org/10.3745/kipstc.2008.15-c.3.157.
Pełny tekst źródłaHsu, Robert C., Jong Hyuk Park, Laurence T. Yang i Mario Freire. "Call for Papers: ‘Secure Communications and Data Management in Ubiquitous Services’". International Journal of Communication Systems 21, nr 5 (2008): 569–70. http://dx.doi.org/10.1002/dac.940.
Pełny tekst źródłaZhou, Yousheng, i Longan Wang. "A Lattice-Based Authentication Scheme for Roaming Service in Ubiquitous Networks with Anonymity". Security and Communication Networks 2020 (28.06.2020): 1–19. http://dx.doi.org/10.1155/2020/2637916.
Pełny tekst źródłaAbumarshoud, Hanaa, Cheng Chen, Mohamed Sufyan Islim i Harald Haas. "Optical wireless communications for cyber-secure ubiquitous wireless networks". Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 476, nr 2242 (październik 2020): 20200162. http://dx.doi.org/10.1098/rspa.2020.0162.
Pełny tekst źródłaBahl, P., W. Russell, Yi-Min Wang, A. Balachandran, G. M. Voelker i A. Miu. "PAWNs: Satisfying the need for ubiquitos secure connectivity and location services". IEEE Wireless Communications 9, nr 1 (luty 2002): 40–48. http://dx.doi.org/10.1109/mwc.2002.986457.
Pełny tekst źródłaMahmood, Zahid, Huansheng Ning, Ata Ullah i Xuanxia Yao. "Secure Authentication and Prescription Safety Protocol for Telecare Health Services Using Ubiquitous IoT". Applied Sciences 7, nr 10 (16.10.2017): 1069. http://dx.doi.org/10.3390/app7101069.
Pełny tekst źródłaJagadamba, G., i B. Sathish Babu. "Context and Trust Based Adaptive Security for Accessing Services in Ubiquitous Computing Environment". International Journal of Systems and Service-Oriented Engineering 6, nr 4 (październik 2016): 1–21. http://dx.doi.org/10.4018/ijssoe.2016100101.
Pełny tekst źródłaLe, Tuan-Vinh. "Securing Group Patient Communication in 6G-Aided Dynamic Ubiquitous Healthcare with Real-Time Mobile DNA Sequencing". Bioengineering 10, nr 7 (15.07.2023): 839. http://dx.doi.org/10.3390/bioengineering10070839.
Pełny tekst źródłaAdithya, B., i B. Sathish Babu. "Capacity and Service (CapServ) Adaptive Trust Computation by Territory Formation in Ubiquitous Environment". International Journal of Advanced Pervasive and Ubiquitous Computing 4, nr 4 (październik 2012): 7–18. http://dx.doi.org/10.4018/japuc.2012100102.
Pełny tekst źródłaAloisio, Giovanni, Massimo Cafaro, Euro Blasi i Italo Epicoco. "The Grid Resource Broker, A Ubiquitous Grid Computing Framework". Scientific Programming 10, nr 2 (2002): 113–19. http://dx.doi.org/10.1155/2002/969307.
Pełny tekst źródłaAhmad, Muhammad, Mohammed A. Alqarni, Asad Khan, Adil Khan, Sajjad Hussain Chauhdary, Manuel Mazzara, Tariq Umer i Salvatore Distefano. "Smartwatch-Based Legitimate User Identification for Cloud-Based Secure Services". Mobile Information Systems 2018 (14.08.2018): 1–14. http://dx.doi.org/10.1155/2018/5107024.
Pełny tekst źródłaYu, Weider D., Jatin Patel, Vishal Mehta i Ashish Joshi. "An Approach to Design a SOA Services Governance Architecture for an u-Healthcare System with Mobility". International Journal of E-Health and Medical Communications 3, nr 2 (kwiecień 2012): 36–65. http://dx.doi.org/10.4018/jehmc.2012040103.
Pełny tekst źródłaLuis M. Contreras, Javier Serrano, Lefteris Mamatas, Giacomo Bernini, Paolo Monti, Mario Antunes, Udayanto Atmojo i in. "Modular architecture providing convergent and ubiquitous intelligent connectivity for networks beyond 2030". ITU Journal on Future and Evolving Technologies 3, nr 3 (8.12.2022): 693–709. http://dx.doi.org/10.52953/samo3073.
Pełny tekst źródłaChang, Chin-Chen, Iuon-Chang Lin i Chia-Chi Wu. "A Multipurpose Key Agreement Scheme in Ubiquitous Computing Environments". Mobile Information Systems 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/934716.
Pełny tekst źródłaSánchez, Daniel, Andrés López, Florina Mendoza i Patricia Arias Cabarcos. "DNS-Based Dynamic Authentication for Microservices in IoT". Proceedings 2, nr 19 (25.10.2018): 1233. http://dx.doi.org/10.3390/proceedings2191233.
Pełny tekst źródłaXiong, Jinbo, Rong Ma, Lei Chen, Youliang Tian, Li Lin i Biao Jin. "Achieving Incentive, Security, and Scalable Privacy Protection in Mobile Crowdsensing Services". Wireless Communications and Mobile Computing 2018 (12.08.2018): 1–12. http://dx.doi.org/10.1155/2018/8959635.
Pełny tekst źródłaTariq, Muhammad Atiq Ur Rehman, Cheuk Yin Wai i Nitin Muttil. "Vulnerability Assessment of Ubiquitous Cities Using the Analytic Hierarchy Process". Future Internet 12, nr 12 (21.12.2020): 235. http://dx.doi.org/10.3390/fi12120235.
Pełny tekst źródłaButpheng, Chanapha, Kuo-Hui Yeh i Jia-Li Hou. "A Secure IoT and Cloud Computing-Enabled e-Health Management System". Security and Communication Networks 2022 (2.06.2022): 1–14. http://dx.doi.org/10.1155/2022/5300253.
Pełny tekst źródłaWoon Lee, Sung, i Hyunsung Kim. "Privacy-Preserving Authentication Scheme for Roaming Service in Global Mobility Networks". International journal of Computer Networks & Communications 13, nr 5 (30.09.2021): 111–28. http://dx.doi.org/10.5121/ijcnc.2021.13507.
Pełny tekst źródłaKwofie, A., i A. A. Barik. "Cloud Security: Using Advance Encryption Standard Algorithm to Secure Cloud Data at Client Side and Taking Measures to Protect its Secrecy". International Journal of Advance Research and Innovation 8, nr 3 (2020): 11–14. http://dx.doi.org/10.51976/ijari.832003.
Pełny tekst źródłaEjaz, Muneeb, Tanesh Kumar, Ivana Kovacevic, Mika Ylianttila i Erkki Harjula. "Health-BlockEdge: Blockchain-Edge Framework for Reliable Low-Latency Digital Healthcare Applications". Sensors 21, nr 7 (3.04.2021): 2502. http://dx.doi.org/10.3390/s21072502.
Pełny tekst źródłaBasha.H, Anwar, S. Amrit Sai, Sanjnah A i Srimathi M. "Cloud Computing: Secure Transmission of High Definition Videos Using Cryptographic Approach". International Journal of Engineering & Technology 7, nr 2.19 (17.04.2018): 94. http://dx.doi.org/10.14419/ijet.v7i2.19.15057.
Pełny tekst źródłaKoppula, Sumanth, i Jayabhaskar Muthukuru. "Secure Digital Signature Scheme Based on Elliptic Curves for Internet of Things". International Journal of Electrical and Computer Engineering (IJECE) 6, nr 3 (1.06.2016): 1002. http://dx.doi.org/10.11591/ijece.v6i3.9420.
Pełny tekst źródłaKoppula, Sumanth, i Jayabhaskar Muthukuru. "Secure Digital Signature Scheme Based on Elliptic Curves for Internet of Things". International Journal of Electrical and Computer Engineering (IJECE) 6, nr 3 (1.06.2016): 1002. http://dx.doi.org/10.11591/ijece.v6i3.pp1002-1010.
Pełny tekst źródłaFITCH, DANIEL, i HAIPING XU. "A RAID-BASED SECURE AND FAULT-TOLERANT MODEL FOR CLOUD INFORMATION STORAGE". International Journal of Software Engineering and Knowledge Engineering 23, nr 05 (czerwiec 2013): 627–54. http://dx.doi.org/10.1142/s0218194013400111.
Pełny tekst źródłaUllah, Insaf, Muhammad Asghar Khan, Ali Alkhalifah, Rosdiadee Nordin, Mohammed H. Alsharif, Abdulaziz H. Alghtani i Ayman A. Aly. "A Multi-Message Multi-Receiver Signcryption Scheme with Edge Computing for Secure and Reliable Wireless Internet of Medical Things Communications". Sustainability 13, nr 23 (28.11.2021): 13184. http://dx.doi.org/10.3390/su132313184.
Pełny tekst źródłaMao, Jian, Wenqian Tian, Yan Zhang, Jian Cui, Hanjun Ma, Jingdong Bian, Jianwei Liu i Jianhong Zhang. "Co-Check: Collaborative Outsourced Data Auditing in Multicloud Environment". Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/2948025.
Pełny tekst źródłaJeong, Young-Sik, Jae Dong Lee, Jeong-Bae Lee, Jai-Jin Jung i Jong Hyuk Park. "An Efficient and Securem-IPS Scheme of Mobile Devices for Human-Centric Computing". Journal of Applied Mathematics 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/198580.
Pełny tekst źródłaKim, Semin, Hyung-Jin Mun i Sunghyuck Hong. "Multi-Factor Authentication with Randomly Selected Authentication Methods with DID on a Random Terminal". Applied Sciences 12, nr 5 (22.02.2022): 2301. http://dx.doi.org/10.3390/app12052301.
Pełny tekst źródłaLe, Tuan-Vinh. "Cross-Server End-to-End Patient Key Agreement Protocol for DNA-Based U-Healthcare in the Internet of Living Things". Mathematics 11, nr 7 (28.03.2023): 1638. http://dx.doi.org/10.3390/math11071638.
Pełny tekst źródłaYu, Binbin, i Hongtu Li. "Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things". International Journal of Distributed Sensor Networks 15, nr 9 (wrzesień 2019): 155014771987937. http://dx.doi.org/10.1177/1550147719879379.
Pełny tekst źródłaShuai, Mengxia, Bin Liu, Nenghai Yu i Ling Xiong. "Lightweight and Secure Three-Factor Authentication Scheme for Remote Patient Monitoring Using On-Body Wireless Networks". Security and Communication Networks 2019 (2.06.2019): 1–14. http://dx.doi.org/10.1155/2019/8145087.
Pełny tekst źródłaDootio, Mazhar Ali, Abdullah Lakhan, Ali Hassan Sodhro, Tor Morten Groenli, Narmeen Zakaria Bawany i Samrat Kumar. "Secure and failure hybrid delay enabled a lightweight RPC and SHDS schemes in Industry 4.0 aware IIoHT enabled fog computing". Mathematical Biosciences and Engineering 19, nr 1 (2021): 513–36. http://dx.doi.org/10.3934/mbe.2022024.
Pełny tekst źródłaSazu, Mesbaul, i Sakila Jahan. "How Big Data Analytics is transforming the finance industry". Bankarstvo 51, nr 2 (2022): 147–72. http://dx.doi.org/10.5937/bankarstvo2202147h.
Pełny tekst źródłaNawaz, Anum, Jorge Peña Queralta, Jixin Guan, Muhammad Awais, Tuan Nguyen Gia, Ali Kashif Bashir, Haibin Kan i Tomi Westerlund. "Edge Computing to Secure IoT Data Ownership and Trade with the Ethereum Blockchain". Sensors 20, nr 14 (16.07.2020): 3965. http://dx.doi.org/10.3390/s20143965.
Pełny tekst źródłaKhalfaoui, Sameh, Jean Leneutre, Arthur Villard, Jingxuan Ma i Pascal Urien. "Security Analysis of Out-of-Band Device Pairing Protocols: A Survey". Wireless Communications and Mobile Computing 2021 (28.01.2021): 1–30. http://dx.doi.org/10.1155/2021/8887472.
Pełny tekst źródłaZomignani Barboza, Júlia, i Paul De Hert. "Data Protection Impact Assessment: A Protection Tool for Migrants Using ICT Solutions". Social Sciences 10, nr 12 (6.12.2021): 466. http://dx.doi.org/10.3390/socsci10120466.
Pełny tekst źródłaRathod, Tejal, Nilesh Kumar Jadav, Sudeep Tanwar, Ravi Sharma, Amr Tolba, Maria Simona Raboaca, Verdes Marina i Wael Said. "Blockchain-Driven Intelligent Scheme for IoT-Based Public Safety System beyond 5G Networks". Sensors 23, nr 2 (14.01.2023): 969. http://dx.doi.org/10.3390/s23020969.
Pełny tekst źródłaDr. Pasumponpandian. "Development of Secure Cloud Based Storage Using the Elgamal Hyper Elliptic Curve Cryptography with Fuzzy Logic Based Integer Selection". Journal of Soft Computing Paradigm 2, nr 1 (15.03.2020): 24–35. http://dx.doi.org/10.36548/jscp.2020.1.003.
Pełny tekst źródłaDíaz-Sánchez, Daniel, Andrés Marín-Lopez, Florina Almenárez Mendoza i Patricia Arias Cabarcos. "DNS/DANE Collision-Based Distributed and Dynamic Authentication for Microservices in IoT †". Sensors 19, nr 15 (26.07.2019): 3292. http://dx.doi.org/10.3390/s19153292.
Pełny tekst źródłaZhao, Dawei, Haipeng Peng, Lixiang Li, Yixian Yang i Shudong Li. "An Efficient Patch Dissemination Strategy for Mobile Networks". Mathematical Problems in Engineering 2013 (2013): 1–13. http://dx.doi.org/10.1155/2013/896187.
Pełny tekst źródłaFarooq, Muhammad Shoaib, Shamyla Riaz, Rabia Tehseen, Uzma Farooq i Khalid Saleem. "Role of Internet of things in diabetes healthcare: Network infrastructure, taxonomy, challenges, and security model". DIGITAL HEALTH 9 (styczeń 2023): 205520762311790. http://dx.doi.org/10.1177/20552076231179056.
Pełny tekst źródłaOrucho, Daniel Okari, Fredrick Mzee Awuor, Ratemo Makiya i Collins Oduor. "An Enhanced Data Transmission in Mobile Banking Using LSB-AES Algorithm". Asian Journal of Research in Computer Science 16, nr 1 (3.06.2023): 43–56. http://dx.doi.org/10.9734/ajrcos/2023/v16i1334.
Pełny tekst źródłaShetty, Sharan, i Sarala Mary. "Cloud Drops Technology Application in Cloud Computing". Research & Review: Machine Learning and Cloud Computing 1, nr 2 (1.07.2022): 34–38. http://dx.doi.org/10.46610/rrmlcc.2022.v01i02.006.
Pełny tekst źródłaLee, Kyuin, Yucheng Yang, Omkar Prabhune, Aishwarya Lekshmi Chithra, Jack West, Kassem Fawaz, Neil Klingensmith, Suman Banerjee i Younghyun Kim. "AEROKEY". Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, nr 1 (29.03.2022): 1–29. http://dx.doi.org/10.1145/3517254.
Pełny tekst źródłaStukalenko, Elena. "Risks of the Digitalization of Life of the Population and Ways of Decreasing Them". Ideas and Ideals 13, nr 4-1 (27.12.2021): 180–203. http://dx.doi.org/10.17212/2075-0862-2021-13.4.1-180-203.
Pełny tekst źródłaHe, Changyang, Lu He, Zhicong Lu i Bo Li. ""I Have to Use My Son's QR Code to Run the Business": Unpacking Senior Street Vendors' Challenges in Mobile Money Collection in China". Proceedings of the ACM on Human-Computer Interaction 7, CSCW1 (14.04.2023): 1–28. http://dx.doi.org/10.1145/3579493.
Pełny tekst źródła