Mostrando 8 resultados de: 8
Filtros aplicados
Publisher
Cluster Computing(1)
IRIS 2016 - 2016 IEEE 4th International Symposium on Robotics and Intelligent Sensors: Empowering Robots with Smart Sensors(1)
Information Technology Journal(1)
International Journal of Applied Engineering Research(1)
Journal of Electronic Testing: Theory and Applications (JETTA)(1)
Área temáticas
Ciencias de la computación(5)
Física aplicada(4)
Programación informática, programas, datos, seguridad(3)
Derecho penal(1)
Dirección general(1)
Área de conocimiento
Ciencias de la computación(5)
Red informática(2)
Software(2)
Ingeniería de software(1)
Tecnologías de la información y la comunicación(1)
Enhanced BSN-Care: Cryptanalysis of BSN-Care and proposal of improved authentication system
Conference ObjectAbstract: Recently, loT based healthcare systems have evolved as a tool to enhance the quality of life of peopPalabras claves:BAN logic, Healthcare service, internet of things, security, Sensor network, user authenticationAutores:Fidel Gastro de la Gruz, Sang Guun YooFuentes:googlescopusDevelopment of a timestamping web application for the electronic factoring process in Ecuador
ArticleAbstract: This document describes the experience in developing a Timestamping application for the Electronic FPalabras claves:FACTORING, security, Timestamping, UWE, XMLAutores:Jesus Mendoza Macias, Sang Guun YooFuentes:googlescopusDDoS avoidance strategy for service availability
ArticleAbstract: Defending from DDoS attacks have become more difficult because they have evolved in many ways. AbsenPalabras claves:DDoS, security, Service availabilityAutores:Kang S.H., Kim J., Park K.Y., Sang Guun YooFuentes:googlescopusA specification based intrusion detection mechanism for the LEACH protocol
ArticleAbstract: With the improvement of the wireless communication and embedded technology, the application of wirelPalabras claves:Intrusion detection system, Low energy adaptive clustering hierarchy protocol, Misbehavior, Network performance analysis, Network simulation, security, wireless sensor networkAutores:Lee S., Lee Y., Sang Guun YooFuentes:googlescopusJTAG security system based on credentials
ArticleAbstract: JTAG (Joint Test Access Group) is a powerful tool for the embedded system development environments.Palabras claves:authentication, Credential, JTAG, securityAutores:Kim J., Kim T., Park K.Y., Sang Guun YooFuentes:googlescopusPrivacy protection mechanism for indoor positioning systems
ArticleAbstract: Usageoflocation based services in indoor environments has grown as the popularity of smart devices hPalabras claves:indoor positioning system, Location based service, privacy, securityAutores:Kim J., Kim S., Sang Guun YooFuentes:googlescopusSecurity over smart home automation systems: A survey
Conference ObjectAbstract: Internet of Things (IoT) is growing every day since it has allowed the interconnection of differentPalabras claves:IOT, MECHANISMS, security, SHAS, Smart homeAutores:Barriga J.J.A., Sang Guun YooFuentes:googlescopusSoftware architecture of JTAG security system
ArticleAbstract: The issue of JTAG security has recently become of interest not only to academic researchers but alsoPalabras claves:JTAG, RUP, security, Software architectureAutores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopus