Showing 141 - 160 results of 5,694 for search '"internet"', query time: 0.08s Refine Results
  1. 141

    Research on naming and addressing technology of the Internet of things by Lingyun JIANG, Yanru MU, Hongbo ZHU

    Published 2018-09-01
    “…With the rapid development of Internet of things,traditional naming and addressing schemes such as IP and URI are facing many challenges,including mobility,security and scalability,etc.In such context,the research progress of naming and addressing technology based on traditional network architecture and future network architecture was described.Then the development trend and core problems in this field were discussed.It was expected to be helpful for the domestic research in the related field.…”
    Get full text
    Article
  2. 142
  3. 143

    Internet of energy things and its key technologies by Junyong LIU, Li PAN, Mai HE

    Published 2020-12-01
    Subjects: “…Internet of energy things…”
    Get full text
    Article
  4. 144

    Exhibition and Surveillance on the Internet: A Critical Reading by Güler Demir

    Published 2016-09-01
    Subjects: “…İnternet…”
    Get full text
    Article
  5. 145
  6. 146

    Survey on data preserving for the search of internet of things by Jia-hui WANG, Chuan-yi LIU, Bin-xing FANG

    Published 2016-09-01
    Subjects: “…search for internet of things…”
    Get full text
    Article
  7. 147
  8. 148
  9. 149
  10. 150
  11. 151

    Data security for internet plus in public cloud by Yongjian WANG, Aibo SONG, Yawei YE, Haibo JIANG

    Published 2017-10-01
    “…“Internet plus” has given birth to many new economic forms and business models,the public cloud faces a serious security challenges.The security of public cloud data was studied and the research ideas were put forward.Firstly,the concept of homomorphic encryption,the characteristics of additive homomorphic encryption and multiplicative homomorphic encryption,and the current research results and difficult problems to be solved were analyzed.Then,based on the multiplicative homomorphic encryption algorithm,hash table and similarity theory,a data security protection scheme was proposed,and the concrete realization process was described.The similarity and completeness of the encrypted data in the public cloud were tested by Euclidean distance.Finally,the correctness and security of the scheme were analyzed by theory.The simulation results verify the feasibility and validity of the scheme.…”
    Get full text
    Article
  12. 152
  13. 153

    Experience in researching the identity of active internet users by Viktoriya A. Peregudina

    Published 2021-10-01
    “…To compare the aspects of the identity of the personality of active Internet users (I-virtual, I-ideal and I-real), the criteria of differentiation of existing images, the multiplicity of created Self-images, as well as the degree of fullness and development of specific aspects of identity are used. …”
    Get full text
    Article
  14. 154
  15. 155

    Survey of the Internet of things operating system security by Anni PENG, Wei ZHOU, Yan JIA, Yuqing ZHANG

    Published 2018-03-01
    Subjects: “…Internet of things…”
    Get full text
    Article
  16. 156
  17. 157

    Research progress of the antenna technology for internet of things by Wenjun LV, Jian YU, Hongbo ZHU

    Published 2019-07-01
    Subjects: “…Internet of things…”
    Get full text
    Article
  18. 158
  19. 159
  20. 160

    Introduction and critical technology analysis of internet of vehicle by Jie LI

    Published 2016-08-01
    Subjects: “…internet of vehicle…”
    Get full text
    Article