• Aucun résultat trouvé

[PDF] Top 20 A new scalable authentication and access control mechanism for 5G-based IoT

Has 10000 "A new scalable authentication and access control mechanism for 5G-based IoT" found on our website. Below are the top 20 most common "A new scalable authentication and access control mechanism for 5G-based IoT".

A new scalable authentication and access control mechanism for 5G-based IoT

A new scalable authentication and access control mechanism for 5G-based IoT

... cost-effective and flexible infrastructures to cellular systems, allowing them to provide services in a dynamic manner, by converting the physical entities of the network into virtual network functions ... Voir le document complet

34

Securing Complex IoT Platforms with Token Based Access Control and Authenticated Key Establishment

Securing Complex IoT Platforms with Token Based Access Control and Authenticated Key Establishment

... proposes a new authentication and authoriza- tion ...lightweight IoT architec- ture of ACE. We designed a framework that uses basic PKI functionalities for dynamic entity ... Voir le document complet

10

A Lightweight Mutual Authentication Protocol for the IoT

A Lightweight Mutual Authentication Protocol for the IoT

... Test and evaluation For testing our authentication mechanism, we implemented our protocol in the OCARI stack software ...is based on the IEEE ...plants and factories. This layer ... Voir le document complet

11

Authentication and access control based on distributed ledger technology

Authentication and access control based on distributed ledger technology

... consensus mechanism and it would be very resource consuming for these ...blockchain-based authentication and authorization solution is proposed by Widick et ...to control ... Voir le document complet

9

Radio Access Network Sharing in 5G: Strategies and Benefits

Radio Access Network Sharing in 5G: Strategies and Benefits

... by a high number of guest users, which affect its clients ...satisfaction and profits as ...to control the guests flow and to induce additional ...improved a lot the blocking rates. ... Voir le document complet

14

5G innovations for new business opportunities

5G innovations for new business opportunities

... interface New waveforms that are robust against time-offset do not require signalling associated with time alignment, allowing for reduced ...latency. A flexible frame design allows multiplexing of ... Voir le document complet

19

Social Semantic Network-Based Access Control

Social Semantic Network-Based Access Control

... data and other ...grant access to users by considering not only their personal informa- tion, but also additional attributes, ...time and location ...the access request takes ...use, ... Voir le document complet

36

A mapping and localization framework for scalable appearance-based navigation

A mapping and localization framework for scalable appearance-based navigation

... presents a vision framework which enables feature-oriented appearance- based navigation in large outdoor environments containing other moving ...is based on a hybrid topological–geometrical ... Voir le document complet

73

Control-based Design of a Five-bar Mechanism

Control-based Design of a Five-bar Mechanism

... five-bar mechanism using a classical design method- ...the new methodology, taking into account the nature of the desired control scheme through the incorporation of ... Voir le document complet

9

Client-Based Access Control Management for XML documents

Client-Based Access Control Management for XML documents

... on a pending rule, that is a rule for which the navigational path final state has been reached but at least one predi- cate path final state remains to be ...to a pending situation. Any rule ... Voir le document complet

28

A Card-less TEE-Based Solution for Trusted Access Control

A Card-less TEE-Based Solution for Trusted Access Control

... TEE for the end user and a private cloud-based TEE for the ...selected for the above reasons. Second, is the possibility to rely on a single cloud-based TEE that ... Voir le document complet

7

2019 — Energy efficient software update mechanism for networked component-based IoT devices

2019 — Energy efficient software update mechanism for networked component-based IoT devices

... Peer-to-Peer mechanism Another typical update mechanism of IoT/sensor networks is peer-to-peer(P2P), that is illus- trated in ...this mechanism, nodes are more autonomous compared to the ... Voir le document complet

88

A lattice based authentication for low-cost RFID

A lattice based authentication for low-cost RFID

... mutual authentication based on the NTRU public key cryptosystem ...ture for encryption/decryption that requires only 10.8 ����� for (�, �, �) = (167, 3, 128), our solution does not dedicate ... Voir le document complet

7

A New Decision-Theory-Based Framework for Echo Canceler Control

A New Decision-Theory-Based Framework for Echo Canceler Control

... uses a shadow adaptive filter that operates in parallel with the actual echo cancellation ...is a better estimate of the unknown channel response than the echo cancellation ...allows a much better ... Voir le document complet

12

A new decision-theory-based framework for echo canceler control

A new decision-theory-based framework for echo canceler control

... uses a shadow adaptive filter that operates in parallel with the actual echo cancellation ...is a better estimate of the unknown channel response than the echo cancellation ...allows a much better ... Voir le document complet

12

Scalable and Privacy-Preserving Admission Control for Smart Grids

Scalable and Privacy-Preserving Admission Control for Smart Grids

... shaving for an energy supplier, which wants to reduce its customers’ consumption during the time of the day when energy costs are ...(DSO), and/or with novel intermediate figures called load aggregators ... Voir le document complet

30

Multi-Block Ascending Auctions for Effective 5G Licensed Shared Access

Multi-Block Ascending Auctions for Effective 5G Licensed Shared Access

... bidders and the auctioneer, leading to more ...extends and improves the state-of-the-art auctions for the LSA context as well as our previous work ...allocated for one group via a ... Voir le document complet

13

MAC Mechanism for a Scalable Wireless Sensor Networks using Independent Duty Cycles

MAC Mechanism for a Scalable Wireless Sensor Networks using Independent Duty Cycles

... [7], a TDMA (time-division multiple access) approach is used to synchronize ...nodes. A slot is assigned to all nodes in the configuration phase, and is used in case of high ...nodes ... Voir le document complet

7

Convex optimization and machine learning for scalable verification and control

Convex optimization and machine learning for scalable verification and control

... manipulation, and computer vision. And thanks to Mieke Moran, Stacie Ford (from TRI), and Gretchen Jones for being so awesome at supporting our ...peripheral for me to invest ... Voir le document complet

135

A Language-based Approach for Interoperability of IoT Platforms

A Language-based Approach for Interoperability of IoT Platforms

... define a standard stack of layered technologies, as well as software architectural styles and programming patterns, to uniform and simplify the creation of IoT ...on a WoT Architecture ... Voir le document complet

12

Show all 10000 documents...