Mostrando 5 resultados de: 5
Filtros aplicados
Publisher
2011 7th Latin American Network Operations and Management Symposium, LANOMS 2011(1)
IEEE Communications Surveys and Tutorials(1)
Investigacion Operacional(1)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)(1)
Proceedings - IEEE Symposium on Computers and Communications(1)
Área temáticas
Ciencias de la computación(5)
Derecho laboral, social, educativo y cultural(1)
Derechos civiles y políticos(1)
Dirección general(1)
Estadísticas generales de África(1)
Área de conocimiento
Ciencias de la computación(4)
Biologically inspired architecture for security management on wireless self-organized networks
Conference ObjectAbstract: This work presents SAMNAR, a survivable architecture for wireless self-organized networks (WSONs). SPalabras claves:Autores:Jenny Torres, Nogueira M., Pujolle G., Santos A.Fuentes:googlescopusA survey on identity management for the future network
ArticleAbstract: The Internet as a platform for ubiquitous communication has quickly advanced in the last years. NewPalabras claves:Future network, Identity Management, Network InfrastructureAutores:Jenny Torres, Nogueira M., Pujolle G.Fuentes:googlescopusSecure and Internet-Less Connectivity to a Blockchain Network for Limited Connectivity Bank Users
Conference ObjectAbstract: Over the past few years, we have seen the emergence of a wide range of banking architectures, technoPalabras claves:Banking transactions, BLOCKCHAIN, ETHEREUM, Mobile Networks, Offline networks, SMART CONTRACTS, smsAutores:Badra M., Daniel Maldonado-Ruiz, El Madhoun N., Jenny TorresFuentes:googlescopusSecure and revocable node authentication in Vehicular Ad-Hoc Networks
Conference ObjectAbstract: In Vehicular Ad-hoc Networks (VANETs), node authentication is an inherent problem since nodes enterPalabras claves:Identity Management, revocation, security, VANetAutores:Jenny Torres, Nogueira M., Pujolle G.Fuentes:googlescopusRsa over-encryption implementation for networking: A proof of concept using mobile devices
ArticleAbstract: RSA is a cryptographic system which is widely used to protect the confidentiality of information traPalabras claves:encryption, Implementation, over-encryption, RSA, securityAutores:Fausto Meneses, Jenny Torres, Luis Hidalgo, Walter FuertesFuentes:googlescopus