[HTML][HTML] Systematic review of authentication and authorization advancements for the Internet of Things
Technologies for the Internet of Things (IoT) are maturing, yet no common standards dictate
their direction, leaving space for a plethora of research directions and opportunities. Among …
their direction, leaving space for a plethora of research directions and opportunities. Among …
[HTML][HTML] A review of emerging technologies for IoT-based smart cities
Smart cities can be complemented by fusing various components and incorporating recent
emerging technologies. IoT communications are crucial to smart city operations, which are …
emerging technologies. IoT communications are crucial to smart city operations, which are …
BFIM: Performance measurement of a blockchain based hierarchical tree layered fog-IoT microservice architecture
Fog computing complements cloud computing by removing several limitations, such as
delays and network bandwidth. It emerged to support Internet of Things (IoT) applications …
delays and network bandwidth. It emerged to support Internet of Things (IoT) applications …
[HTML][HTML] Concept to reality: An integrated approach to testing software user interfaces
This paper delves into the complex task of evaluating a website user interface (UI) and user
experience (UX), a process complicated by gaps in research. To bridge this, we introduced …
experience (UX), a process complicated by gaps in research. To bridge this, we introduced …
[HTML][HTML] LAMAS: Lightweight anonymous mutual authentication scheme for securing fog computing environments
Fog computing uses near-user edge devices that are usually smart devices with very limited
storage and computation resources; hence, the authentication process should be lightweight …
storage and computation resources; hence, the authentication process should be lightweight …
TS-ABOS-CMS: Time-bounded secure attribute-based online/offline signature with constant message size for IoT systems
H Hong, Z Sun - Journal of Systems Architecture, 2022 - Elsevier
Authentication is especially significant in IoT since the identity of the connected object needs
to be verified before carrying out interaction processes with the various IoT data. The …
to be verified before carrying out interaction processes with the various IoT data. The …
Analyzing the effectiveness of several machine learning methods for heart attack prediction
Heart attack or heart failure cases are rising quickly each day, thus it is crucial and
worrisome to anticipate any problems in advance. A heart attack is a significant medical …
worrisome to anticipate any problems in advance. A heart attack is a significant medical …
A resilient fog-IoT framework for seamless microservice execution
Microservices have been proposed as the software architecture style for fog-IoT network
applications ecosystems. Recently, microservices have been extensively used in fog-IoT …
applications ecosystems. Recently, microservices have been extensively used in fog-IoT …
HIBAF: A data security scheme for fog computing
M Whaiduzzaman, N Farjana, A Barros… - Journal of High …, 2021 - journals.sagepub.com
Fog computing complemented cloud computing integration services in the Internet of Things
(IoT) and the web of real-time interactivity. Fog offers faster computing and other services …
(IoT) and the web of real-time interactivity. Fog offers faster computing and other services …
A review on VANET security: Future challenges and open issues
Abstract Vehicular Adhoc Network (VANET) is an established technology that is well-suited
for emerging technologies such as the Internet of Vehicles (IoV) and Unmanned Aerial …
for emerging technologies such as the Internet of Vehicles (IoV) and Unmanned Aerial …