Showing 241 - 260 results of 19,848 for search 'Alternet~', query time: 9.54s Refine Results
  1. 241
  2. 242

    SDN-Enabled Communication Network Framework for Energy Internet by Zhaoming Lu, Chunlei Sun, Jinqian Cheng, Yang Li, Yong Li, Xiangming Wen

    Published 2017-01-01
    “…To support distributed energy generators and improve energy utilization, energy Internet has attracted global research focus. In China, energy Internet has been proposed as an important issue of government and institutes. …”
    Get full text
    Article
  3. 243

    Anonymous Authentication Scheme for Intercommunication in the Internet of Things Environments by Youngseok Chung, Seokjin Choi, Dongho Won

    Published 2015-11-01
    “…Authentication and privacy protection are important security mechanisms for keeping things safe in the Internet of Things environments. In particular, an anonymous authentication scheme is a privacy preserving authentication technique which provides both authentication and privacy preservation. …”
    Get full text
    Article
  4. 244
  5. 245
  6. 246

    Securing Cloud-Based Internet of Things: Challenges and Mitigations by Nivedita Singh, Rajkumar Buyya, Hyoungshick Kim

    Published 2024-12-01
    “…The Internet of Things (IoT) has seen remarkable advancements in recent years, leading to a paradigm shift in the digital landscape. …”
    Get full text
    Article
  7. 247

    Systematic literature review on Internet-of-Vehicles communication security by Manar Abu Talib, Sohail Abbas, Qassim Nasir, Mohamad Fouzi Mowakeh

    Published 2018-12-01
    “…Currently, the popularity of Internet-of-Vehicles technology and self-driving cars are increasing rapidly. …”
    Get full text
    Article
  8. 248
  9. 249

    AN EXAMINATION OF THE IMPLEMENTATION OF INTERNET OF THINGS IN HEALTHCARE UTILIZING SMARTWATCHES by Fatemeh Sadeghi Boshrabadi, Moussa Abolhassani, Shadi Shafaghi, Fariba Ghorbani, Masoud Shafaghi

    Published 2024-12-01
    “…The search keywords were “wearables, internet of things, smartwatches, smart bracelet, healthcare, and disease”. …”
    Get full text
    Article
  10. 250
  11. 251
  12. 252
  13. 253
  14. 254

    Graph-based service recommendation in Social Internet of Things by Yuanyi Chen, Yanyun Tao, Zengwei Zheng, Dan Chen

    Published 2021-04-01
    “…While it is well understood that the emerging Social Internet of Things offers the capability of effectively integrating and managing massive heterogeneous IoT objects, it also presents new challenges for suggesting useful objects with certain service for users due to complex relationships in Social Internet of Things, such as user’s object usage pattern and various social relationships among Social Internet of Things objects. …”
    Get full text
    Article
  15. 255

    TRENDELENBURG'UN KANT'I: İHMAL EDİLMİŞ ALTERNETİF by Kubilay Hoşgör

    Published 2022-07-01
    Subjects: “…the neglected alternative…”
    Get full text
    Article
  16. 256
  17. 257

    Research and implementation of safety authentication technology in Internet of vehicles by Manzhu WANG, Ziqi LI, Yifei CHEN, Gaofeng HONG, Wei SU

    Published 2021-09-01
    “…Nowadays, safety certification technology for Internet of vehicles (IoV) cannot well defend the various attacks, and there are also many shortcomings when considering the balance between safety and performance.Based on the in-depth analysis of the research status and security threats for IoV, a hierarchical vehicle-to-vehicle (V2V) safety authentication scheme was proposed.Furthermore, an L-type safety authentication scheme which based on more than one trusted third parties was proposed.Aimed at ensuring the information safety of the communication process and preventing the communication data from being stolen, the schemes were more suitable to IoV.…”
    Get full text
    Article
  18. 258
  19. 259

    Constructing the Green Campus within the Internet of Things Architecture by Hsing-I Wang

    Published 2014-03-01
    “…The “Internet of Things” radically changes the view of the “Internet” by embracing every physical object into network. …”
    Get full text
    Article
  20. 260