Search

Your search keyword '"security protocol"' showing total 32 results

Search Constraints

Start Over You searched for: Descriptor "security protocol" Remove constraint Descriptor: "security protocol" Topic internet of things Remove constraint Topic: internet of things
32 results on '"security protocol"'

Search Results

1. APSec1.0: Innovative Security Protocol Design with Formal Security Analysis for the Artificial Pancreas System.

2. Secure system with security protocol for interactions in healthcare Internet of Things.

3. A Secure IIoT Gateway Architecture based on Trusted Execution Environments.

4. Security protocol for securing notifications about dangerous events in the agglomeration.

5. Sigforgery: Breaking and Fixing Data Authenticity in Sigfox

6. Comparative Analysis of Security Protocols in IoT

7. PEASE: A PUF-Based Efficient Authentication and Session Establishment Protocol for Machine-to-Machine Communication in Industrial IoT.

8. Security analysis on "Three-factor authentication protocol using physical unclonable function for IoV".

9. User Authentication and Authorization Framework in IoT Protocols.

10. Crystals kyber cryptographic algorithm for efficient IoT D2d communication.

11. User Authentication and Authorization Framework in IoT Protocols

12. An analysis of the Gateway Integrity Checking Protocol from the perspective of Intrusion Detection Systems.

13. Lightweight Multi-party Authentication and Key Agreement Protocol in IoT-based E-Healthcare Service.

14. Robust session key generation protocol for social internet of vehicles with enhanced security provision.

15. HARCI: A Two-Way Authentication Protocol for Three Entity Healthcare IoT Networks.

16. Security offloading network system for expanded security coverage in IPv6-based resource constrained data service networks.

17. Comments on "A Multi-factor User Authentication and Key Agreement Protocol Based on Bilinear Pairing for the Internet of Things".

18. Security Analysis on “A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems”.

20. Verifying a secure authentication protocol for IoT medical devices.

22. Cybersecurity and the Digital Health: An Investigation on the State of the Art and the Position of the Actors.

25. Proposing and verifying a security-enhanced protocol for IoT-based communication for medical devices.

26. Distributed key agreement for group communications based on elliptic curves. An application to sensor networks.

27. Secure pseudonym-based near field communication protocol for the consumer internet of things.

28. Efficient ASIC Implementation and Analysis of Two EPC-C1G2 RFID Authentication Protocols.

29. Design of peer-to-peer protocol with sensible and secure IoT communication for future internet architecture.

30. SKINNY-Based RFID Lightweight Authentication Protocol.

31. An ontology-based approach for helping to secure the ETSI machine-to-machine architecture

32. An Ontology-Based Approach for Helping to Secure the ETSI Machine-to-Machine Architecture

Catalog

Books, media, physical & digital resources