A survey on mobile augmented reality with 5G mobile edge computing: Architectures, applications, and technical aspects
The Augmented Reality (AR) technology enhances the human perception of the world by
combining the real environment with the virtual space. With the explosive growth of powerful …
combining the real environment with the virtual space. With the explosive growth of powerful …
Lightweight and anonymity-preserving user authentication scheme for IoT-based healthcare
Internet of Things (IoT) produces massive heterogeneous data from various applications,
including digital health, smart hospitals, automated pathology labs, and so forth. IoT sensor …
including digital health, smart hospitals, automated pathology labs, and so forth. IoT sensor …
A lightweight and robust secure key establishment protocol for internet of medical things in COVID-19 patients care
Due to the outbreak of COVID-19, the Internet of Medical Things (IoMT) has enabled the
doctors to remotely diagnose the patients, control the medical equipment, and monitor the …
doctors to remotely diagnose the patients, control the medical equipment, and monitor the …
The duo of artificial intelligence and big data for industry 4.0: Applications, techniques, challenges, and future research directions
The increasing need for economic, safe, and sustainable smart manufacturing combined
with novel technological enablers has paved the way for artificial intelligence (AI) and big …
with novel technological enablers has paved the way for artificial intelligence (AI) and big …
Industrial Internet of Things Ecosystems Security and Digital Forensics: Achievements, Open Challenges, and Future Directions
The Industrial Internet of Things (IIoT) has been positioned as a key pillar of the Industry 4.0
revolution, which is projected to continue accelerating and realizing digital transformations …
revolution, which is projected to continue accelerating and realizing digital transformations …
[HTML][HTML] An empirical assessment of ensemble methods and traditional machine learning techniques for web-based attack detection in industry 5.0
Cybersecurity attacks that target software have become profitable and popular targets for
cybercriminals who consciously take advantage of web-based vulnerabilities and execute …
cybercriminals who consciously take advantage of web-based vulnerabilities and execute …
Zero knowledge proofs based authenticated key agreement protocol for sustainable healthcare
Upgradation of technologies for sustainable smart cities has led to rapid growth in Internet of
Things (IoT) applications, including e-healthcare services wherein smart devices collect …
Things (IoT) applications, including e-healthcare services wherein smart devices collect …
A robust and lightweight secure access scheme for cloud based E-healthcare services
Traditional healthcare services have transitioned into modern healthcare services where
doctors remotely diagnose the patients. Cloud computing plays a significant role in this …
doctors remotely diagnose the patients. Cloud computing plays a significant role in this …
A smart secure healthcare monitoring system with Internet of Medical Things
The new era of information technologies made smart healthcare by including edge, Internet
of Things (loT), Internet of Medical Things (IoMT), cloud computing etc. This adaptation has …
of Things (loT), Internet of Medical Things (IoMT), cloud computing etc. This adaptation has …
[HTML][HTML] A user-centric privacy-preserving authentication protocol for IoT-AmI environments
Abstract Ambient Intelligence (AmI) in Internet of Things (IoT) has empowered healthcare
professionals to monitor, diagnose, and treat patients remotely. Besides, the AmI-IoT has …
professionals to monitor, diagnose, and treat patients remotely. Besides, the AmI-IoT has …