Security
Dynamic Trust-Based Device Legitimacy Assessment Towards Secure IoT Interactions
2022| Vol. 18 (3) | Open Call Articles| Pages: 269-276| PDF (1.84 MiB) | 2022-09-14 |0 views| 0 CrossRef citationsA Blockchain Application Prototype for the Internet of Things
2022| Vol. 18 (2) | Open Call Articles| Pages: 124-136| PDF (1.31 MiB) | 2022-04-19 |0 views| 0 CrossRef citationsTowards Trust Model in Unmanned Aerial Vehicle Ad Hoc Networks
2021| Vol. 17 (3) | Open Call Articles| Pages: 213-220| PDF (1.17 MiB) | 2021-07-12 |19 views| 0 CrossRef citationsAssuring M2M Secure Transactions via Blockchain and Smart Contracts
2021| Vol. 17 (3) | Open Call Articles| Pages: 260-269| PDF (12.23 MiB) | 2021-08-24 |21 views| 0 CrossRef citationsMQTT-Auth: a Token-based Solution to Endow MQTT with Authentication and Authorization Capabilities
2018| Vol. 14 (4) | Open Call Articles| Pages: 320-331| PDF (1.45 MiB) | 2018-10-30 |9 views| 9 CrossRef citationsSecurity Threats in Software Defined Mobile Clouds (SDMC)
2016| Vol. 12 (2) | Open Call Articles| Pages: 105-111| PDF (1.11 MiB) | 2016-06-22 |8 views| 0 CrossRef citationsA Novel Unique Parameter for Increasing of Security in GPON Networks
2016| Vol. 12 (2) | Open Call Articles| Pages: 112-116| PDF (1.37 MiB) | 2016-06-22 |6 views| 2 CrossRef citationsAn Efficient and Private Authentication Protocol for RFID Systems
2013| Vol. 9 (2) | Open Call Articles| Pages: 128-136| PDF (875 KiB) | 2013-06-21 |15 views| 1 CrossRef citationSecure Mobile IPv6 for Mobile Networks based on the 3GPP IP Multimedia Subsystem
2007| Vol. 3 (2) | Open Call Articles| Pages: 90-98| PDF (1.32 MiB) | 2007-06-21 |7 views| 0 CrossRef citationsDelPHIX: A Simple and Efficient Mechanism for Wormhole Detection in Ad Hoc Networks
2006| Vol. 2 (2) | Open Call Articles| Pages: 131-140| PDF (543 KiB) | 2017-04-05 |9 views| 0 CrossRef citations