Filters








177 Hits in 3.6 sec

Preface

Jianying Zhou, Meng-Chow Kang, Jianying Zhou, Meng-Chow Kang
<span title="2006-11-08">2006</span> <i title="IOS Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/spxf4rshtfhgvoxv3apocfge6m" style="color: black;">Journal of Computer Security</a> </i> &nbsp;
The International Workshop for Applied PKI (IWAP) is an annual workshop that was initiated in 2001 with the objective of focusing on research and application of Public Key Infrastructure.  ...  Over the past years, Public Key Infrastructure (PKI) technology has evolved and moved from the research laboratories to the mainstream, where many organizations are now leveraging it as part of their core  ...  The fourth paper is "Unleashing Public-Key Cryptography in Wireless Sensor Networks" by Javier Lopez.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3233/jcs-2006-14501">doi:10.3233/jcs-2006-14501</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ksrzlwypdngxtmozjilfpzfjhi">fatcat:ksrzlwypdngxtmozjilfpzfjhi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171026000556/https://content.iospress.com/download/journal-of-computer-security/jcs267?id=journal-of-computer-security%2Fjcs267" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/40/65/40656365262dac959d2e8e443b09f500696744a2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3233/jcs-2006-14501"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Integrating wireless sensor networks and the internet: a security analysis

Rodrigo Roman, Javier Lopez, Jong Hyuk Park
<span title="2009-04-03">2009</span> <i title="Emerald"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/u445k4bfuzeg7oihk62atewhvu" style="color: black;">Internet Research</a> </i> &nbsp;
Purpose -To analyze the security issues that arise when integrating Wireless Sensor Networks (WSN) and the Internet.  ...  Findings -By providing the services of the network through a front-end proxy, a sensor network and the Internet can interact securely.  ...  The actual sensor hardware is perfectly capable of using cryptographic primitives, such as symmetric key cryptography, public key cryptography, and hash functions.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1108/10662240910952373">doi:10.1108/10662240910952373</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/eoezgp2rrve6rnhqr5fvc2fvj4">fatcat:eoezgp2rrve6rnhqr5fvc2fvj4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170810132600/https://www.nics.uma.es/sites/default/files/papers/roman2009a.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/85/fc/85fcc8ffe88c9047cdb65f97a3bc185c7b6f6bd9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1108/10662240910952373"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Security in wireless ad-hoc networks – A survey

R. Di Pietro, S. Guarino, N.V. Verde, J. Domingo-Ferrer
<span title="">2014</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/mnyvgmlsc5a5xi7554ow77exfu" style="color: black;">Computer Communications</a> </i> &nbsp;
9 Pervasive mobile and low-end wireless technologies, such as radiofrequency identification (RFID), wireless sensor networks and the impending vehicular ad-hoc networks (VANETs), make the wireless scenario  ...  For all the above (and similar) technologies to fully unleash their potential in the industry and society, there are two pillars that cannot be overlooked: security and privacy.  ...  For low-1499 end networks, symmetric cryptography is the preferred choice, whereas public-1500 key cryptography, including group and threshold cryptography, can be afforded 1501 in the high-end networks  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.comcom.2014.06.003">doi:10.1016/j.comcom.2014.06.003</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/dxpctx3ta5c6fllp2pxacffl2y">fatcat:dxpctx3ta5c6fllp2pxacffl2y</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809101253/https://crises-deim.urv.cat/web/docs/publications/journals/831.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/cc/b3/ccb3d11cd1d4ffd52318de9a9b4ede84f11b5d3d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.comcom.2014.06.003"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

Guest Editorial: Privacy, Data Assurance, Security Solutions for Internet of Things (PASS4IoT)

<span title="2018-09-01">2018</span> <i title="Institution of Engineering and Technology (IET)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ghoo7yee6vcx7ffz2bpjziedbe" style="color: black;">IET Networks</a> </i> &nbsp;
over resource constrained environment in IoT, such as wireless sensor networks, etc.  ...  The second paper, entitled 'Efficient aggregation technique for data privacy in wireless sensor networks', authored by Manjula Raja and Raja Datta, offers an efficient aggregation technique for data privacy  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1049/iet-net.2018.0046">doi:10.1049/iet-net.2018.0046</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/fvav2dp3uzbjjn6obpcpq2xvnm">fatcat:fvav2dp3uzbjjn6obpcpq2xvnm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210716193334/https://ietresearch.onlinelibrary.wiley.com/doi/pdfdirect/10.1049/iet-net.2018.0046" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/59/84/59840e49ca15c92a4db5412734afba33087def4d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1049/iet-net.2018.0046"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

A SURVEY OF SECURITY VULNERABILITIES IN WIRELESS SENSOR NETWORKS

VE Ekong, UO Ekong
<span title="2016-04-02">2016</span> <i title="African Journals Online (AJOL)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/v6azywt6zzdwdabxbpbdqfxsn4" style="color: black;">Nigerian Journal of Technology</a> </i> &nbsp;
Security concerns constitute a potential stumbling block to the impending wide deployment of wireless sensor networks (WSNs).  ...  Sensor networks offer a powerful combination of distributed sensing, computing and communications.  ...  Tackling Data Traffic Analysis Attack will require Sensor identities and public keys encryption to be used. Anonymity mechanisms can be used to check traffic analysis.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4314/njt.v35i2.21">doi:10.4314/njt.v35i2.21</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/jwgo3u4ee5acrd353zg5ztyy2a">fatcat:jwgo3u4ee5acrd353zg5ztyy2a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180722101835/https://www.ajol.info/index.php/njt/article/download/140619/130359" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8f/7a/8f7ae1659dbd6fa2a942837c15701a5250bf17a1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4314/njt.v35i2.21"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Computational Intelligence based Intrusion Detection Systems for Wireless Communication [article]

Abhishek Gupta, Om Jee Pandey, Mahendra Shukla, Anjali Dadhich, Samar Mathur, Anup Ingle
<span title="2021-04-22">2021</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
novel three-tier architecture for designing intelligent intrusion detection systems for wireless networks.  ...  everyday devices such as wristwatches, smart phones, home video systems, autofocus cameras, intelligent vehicles, musical instruments, kitchen appliances etc. with microprocessors and imparts them with wireless  ...  Abhyankar for constantly providing us with significant insights and valuable knowledge that have been an immense source of help in carrying on the project.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2105.03204v1">arXiv:2105.03204v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/iprbmqvngbe35ak3w33ubve7gq">fatcat:iprbmqvngbe35ak3w33ubve7gq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210511111207/https://arxiv.org/ftp/arxiv/papers/2105/2105.03204.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/36/89/368954061c32fccf1c2ecdbb56498df30ce63590.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2105.03204v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Satellite-Based Communications Security: A Survey of Threats, Solutions, and Research Challenges [article]

Pietro Tedeschi and Savio Sciancalepore and Roberto Di Pietro
<span title="2021-12-23">2021</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
., physical-layer confidentiality, anti-jamming schemes, anti-spoofing strategies, and quantum-based key distribution schemes.  ...  Specifically, we classify the literature on security for SATCOM systems into two main branches, i.e., physical-layer security and cryptography schemes.  ...  ) or public key perspective, as it allows to maximize in analytical terms the solutions.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2112.11324v2">arXiv:2112.11324v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mdrumzffujdwzmzqwajk3hkxbm">fatcat:mdrumzffujdwzmzqwajk3hkxbm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220101024219/https://arxiv.org/pdf/2112.11324v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/57/dc/57dc282ac89af4cad20951f02454b87e5c5099ca.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2112.11324v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Emerging RFID/USN Applications and Challenges

Myo Min Aung, Yoon Seok Chang, Jong-Un Won
<span title="2012-06-01">2012</span> <i title="Infonomics Society"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/okwqpsnmdncblmxy2kmwohy6rq" style="color: black;">International Journal of RFID Security and Cryptography</a> </i> &nbsp;
Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN), also known as Ubiquitous Sensor network (USN) are two important wireless sensing technologies that have wide variety of applications  ...  There are many emerging applications which adopt these technologies today and they have the potential to unleash new opportunities for growth in the market.  ...  However, wireless sensor networks are now using in many civilian and business application areas.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.20533/ijrfidsc.2046.3715.2012.0001">doi:10.20533/ijrfidsc.2046.3715.2012.0001</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ytgvl6rcuvb5lbz6lb3zrsywci">fatcat:ytgvl6rcuvb5lbz6lb3zrsywci</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180603094318/http://infonomics-society.org/wp-content/uploads/ijrfidsc/volume-1-2012/Emerging-RFID-USN-Applications-and-Challenges.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/4b/1a/4b1a8b6225b46de4fb187a2eadd9b27397c280ba.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.20533/ijrfidsc.2046.3715.2012.0001"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Proof of Concept of Scalable Integration of Internet of Things and Blockchain in Healthcare

Krishna Prasad Satamraju, Malarkodi B
<span title="2020-03-03">2020</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/taedaf6aozg7vitz5dpgkojane" style="color: black;">Sensors</a> </i> &nbsp;
In this paper, we are proposing a novel framework, a unique model that integrates IoT networks with a blockchain to address potential privacy and security threats for data integrity.  ...  This innovation explosion has surfaced a new dimension of vulnerability and physical threat to the data integrity of IoT networks.  ...  Asymmetric cryptography uses a public key and private (secret) key pair for encryption and decryption operations.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/s20051389">doi:10.3390/s20051389</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/32138380">pmid:32138380</a> <a target="_blank" rel="external noopener" href="https://pubmed.ncbi.nlm.nih.gov/PMC7085612/">pmcid:PMC7085612</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/nnitf2xzsjfxzifeivy3l5zu5i">fatcat:nnitf2xzsjfxzifeivy3l5zu5i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200307100441/https://res.mdpi.com/d_attachment/sensors/sensors-20-01389/article_deploy/sensors-20-01389.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b5/6f/b56f8040e49eea7bd08401dec2393a60630bc8bf.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/s20051389"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7085612" title="pubmed link"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> pubmed.gov </button> </a>

Data Sharing Mechanism of Sensors and Actuators of Industrial IoT Based on Blockchain-Assisted Identity-Based Cryptography

Yifan Meng, Jingzhao Li
<span title="2021-09-10">2021</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/taedaf6aozg7vitz5dpgkojane" style="color: black;">Sensors</a> </i> &nbsp;
In this paper, to unleash the potential of Industrial IoT, a safe and reliable data sharing mechanism of sensors and actuators is proposed.  ...  The Industrial IoT is one of the key technologies to improve industrial production efficiency.  ...  The asymmetric cryptography algorithm encrypts the public key and private key through pairs, and the public key is visible to anyone [12] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/s21186084">doi:10.3390/s21186084</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/34577289">pmid:34577289</a> <a target="_blank" rel="external noopener" href="https://pubmed.ncbi.nlm.nih.gov/PMC8471528/">pmcid:PMC8471528</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/jfktltkhobfvdo7xrfzdwnze2i">fatcat:jfktltkhobfvdo7xrfzdwnze2i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210916022524/https://mdpi-res.com/d_attachment/sensors/sensors-21-06084/article_deploy/sensors-21-06084-v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/84/95/84958effaf0376cf4ea77ff65a13b083558b90a9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/s21186084"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8471528" title="pubmed link"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> pubmed.gov </button> </a>

Quantum Information Technology and Quantum Sensory Systems Development

P.J. Kervalishvili
<span title="2015-12-01">2015</span> <i title="Infonomics Society"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/nkaggs3w25cyrmwvdfnqfuiidu" style="color: black;">Journal of Internet Technology and Secured Transaction</a> </i> &nbsp;
Multiparametral and multifunctional nature of sensors and their networks was taking into account.  ...  Cryptography has always been an important part of information theory. A lot has been done in classical cryptography. Two main types of algorithms are knownsymmetric and asymmetric.  ...  Actuatorsperform actuation in response to received data; Processing elementspre-processing of transmitted data A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to monitor  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.20533/jitst.2046.3723.2015.0055">doi:10.20533/jitst.2046.3723.2015.0055</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/icluiuquincgdmod25lfto5ywi">fatcat:icluiuquincgdmod25lfto5ywi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180603070201/http://infonomics-society.org/wp-content/uploads/jitst/published-papers/volume-4-2015/Quantum-Information-Technology-and-Quantum-Sensory-Systems-Development.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/00/11/00110a6d98bce361d53c2940873a3a10b0b65541.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.20533/jitst.2046.3723.2015.0055"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Managed Ecosystems of Networked Objects

Jeroen Hoebeke, Eli De Poorter, Stefan Bouckaert, Ingrid Moerman, Piet Demeester
<span title="2011-04-01">2011</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/5ldpa66mwbhejga74di7sle7j4" style="color: black;">Wireless personal communications</a> </i> &nbsp;
The concept maps to many real-life scenarios and should empower application developers to use sensor data in an easy and natural way.  ...  In this paper, we evaluate the current efforts to integrate sensors and actuators into the Internet and identify the limitations at the level of cooperation of these Internet-connected objects and the  ...  , namely elliptic curve cryptography [16] , since it requires smaller key lengths for a given level of security than for example RSA public key cryptography and is thus more suited for sensor nodes.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s11277-011-0292-9">doi:10.1007/s11277-011-0292-9</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3nnjqa6ntrdi3c4lkbohip574q">fatcat:3nnjqa6ntrdi3c4lkbohip574q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170922150929/https://biblio.ugent.be/publication/1261256/file/2952206.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/56/d3/56d391f6ae9ee2df2ab4e6e5cecd801a03d8ef14.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s11277-011-0292-9"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

A Mobile Phone Based Intelligent Telemonitoring Platform

Fahim Sufi, Qiang Fang, Seedahmed S. Mahmoud, Irena Cosic
<span title="">2006</span> <i title="IEEE"> 2006 3rd IEEE/EMBS International Summer School on Medical Devices and Biosensors </i> &nbsp;
In this approach, compression of ECG is done in real-time by the mobile phone for the very first time.  ...  Moreover, the mobile phones used in this platform performs preliminary detection of abnormal biosignal in realtime.  ...  Authentication & Encryption Usage of J2ME unleashes the possibility of PC based encryption techniques like symmetric, asymmetric (Public Key, Private Key based), digital signature, digital time stamping  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/issmdbs.2006.360108">doi:10.1109/issmdbs.2006.360108</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/guc5xrjuojgvnlzep4jexkxifq">fatcat:guc5xrjuojgvnlzep4jexkxifq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170814221402/http://researchbank.rmit.edu.au/view/rmit:1545/n2006001799.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/94/d4/94d44c4537861c9091a688a5b0eee4fa1c8abc61.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/issmdbs.2006.360108"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

REVIEW ON SECURITY IN THE INTERNET OF THINGS

G. Ambika
<span title="2018-02-20">2018</span> <i title="IJARCS International Journal of Advanced Research in Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/dbwzqwxyw5hn3aantchmoxx65q" style="color: black;">International Journal of Advanced Research in Computer Science</a> </i> &nbsp;
Rene Hummen,et al. [18] analyzed the public-key cryptography on the certificate-based DTLS handshake and known significant Random Access Memory and Read Only Memory needs.  ...  [19] presented the security and privacy once using the internet of Things technology, also known as The Internet of Objects, refers to a wireless network between objects; typically the network are wireless  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.26483/ijarcs.v9i1.5258">doi:10.26483/ijarcs.v9i1.5258</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ktkoo4m74jdzhh65mj5nmutd3y">fatcat:ktkoo4m74jdzhh65mj5nmutd3y</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190428025654/http://ijarcs.info/index.php/Ijarcs/article/download/5258/4463" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ee/03/ee039360b1a552e93785d06a9a453ba29119fd7d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.26483/ijarcs.v9i1.5258"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Security in Energy Harvesting Networks: A Survey of Current Solutions and Research Challenges [article]

Pietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro
<span title="2020-05-30">2020</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Surfaces, that could trigger the interest of industry and academia and unleash the full potential of pervasive EH wireless networks.  ...  In this paper, we survey the security issues, applications, techniques, and challenges arising in wireless networks powered via EH technologies.  ...  The information and views set out in this publication are those of the authors and do not necessarily reflect the official opinion of the QNRF.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2004.10394v2">arXiv:2004.10394v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/o4iwqkcdvfgmtjmwmxgvrbt3je">fatcat:o4iwqkcdvfgmtjmwmxgvrbt3je</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200603061846/https://arxiv.org/pdf/2004.10394v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f1/a6/f1a622ad40ff6ff44fbdd4c357ceffdeabab849b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2004.10394v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 177 results