Mostrando 8 resultados de: 8
Filtros aplicados
Publisher
International Journal of Distributed Sensor Networks(2)
Cluster Computing(1)
Information Technology Journal(1)
International Journal of Applied Engineering Research(1)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)(1)
Área temáticas
Ciencias de la computación(6)
Física aplicada(3)
Programación informática, programas, datos, seguridad(3)
Derecho penal(1)
Funcionamiento de bibliotecas y archivos(1)
A performance and usability aware secure two-factor user authentication scheme for wireless sensor networks
ArticleAbstract: Recently, several user authentication schemes for wireless sensor networks based on two-factor concePalabras claves:Autores:Kim J., Lee H., Sang Guun YooFuentes:googlescopusA security-performance-balanced user authentication scheme for wireless sensor networks
ArticleAbstract: The uses of wireless sensor networks have increased to be applicable in many different areas, such aPalabras claves:Autores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopusConfidential information protection system for mobile devices
ArticleAbstract: Mobile devices such as tab devices (e.g. iPad, Galaxy Tab), smart phones, laptops, and ultra-mobilePalabras claves:Information protection, Mobile device, Secure file system, Secure protocolAutores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopusDDoS avoidance strategy for service availability
ArticleAbstract: Defending from DDoS attacks have become more difficult because they have evolved in many ways. AbsenPalabras claves:DDoS, security, Service availabilityAutores:Kang S.H., Kim J., Park K.Y., Sang Guun YooFuentes:googlescopusEnhanced intrusion detection system for PKMv2 EAP-AKA used in WiBro
ArticleAbstract: WiBro (Wireless Broadband), the service based on the IEEE 802.16e (mobile WiMAX) standard, is an emePalabras claves:authentication, Denial of Service, EAP-AKA, intrusion detection, Network security, WiBroAutores:Kim J., Lee S., Lee Y., Sang Guun Yoo, Yang Y.K.Fuentes:googlescopusSERA: A secure energy reliability aware data gathering for sensor networks
ArticleAbstract: Wireless sensor networks are used in many applications in military, ecology, health, and other areasPalabras claves:Key generation, Network simulation, Secure protocol, Sensor networkAutores:Kang S.H., Kim J., Sang Guun YooFuentes:googlescopusPrivacy protection mechanism for indoor positioning systems
ArticleAbstract: Usageoflocation based services in indoor environments has grown as the popularity of smart devices hPalabras claves:indoor positioning system, Location based service, privacy, securityAutores:Kim J., Kim S., Sang Guun YooFuentes:googlescopusSpecification-based intrusion detection system for WiBro
Conference ObjectAbstract: WiBro (Wireless Broadband), the service based on the IEEE 802.16e (mobile WiMAX) standard, is a wirePalabras claves:information security, intrusion detection, Specification, WiBroAutores:Kim J., Lee S., Lee Y., Sang Guun YooFuentes:googlescopus