• Aucun résultat trouvé

[PDF] Top 20 Serverless lightweight mutual authentication protocol for small mobile computing devices

Has 10000 "Serverless lightweight mutual authentication protocol for small mobile computing devices" found on our website. Below are the top 20 most common "Serverless lightweight mutual authentication protocol for small mobile computing devices".

Serverless lightweight mutual authentication protocol for small mobile computing devices

Serverless lightweight mutual authentication protocol for small mobile computing devices

... during authentication of constrained devices was first introduced by Tsudik ...constrained devices do not have embedded clocks to keep track of the ... Voir le document complet

6

A Lightweight IoT Security Protocol

A Lightweight IoT Security Protocol

... Security) protocol for ...a mutual authentication and symmetric key exchange for creating a symmetric secure ...The authentication requires a trustful third ...strong ... Voir le document complet

9

A Lightweight Mutual Authentication Protocol for the IoT

A Lightweight Mutual Authentication Protocol for the IoT

... capacity devices in order to sense and monitor industrial ...no authentication mecha- nism is deployed, this system can be accessible, used and controlled by non-authorized ...WSN mutual ... Voir le document complet

11

Room layout estimation on mobile devices

Room layout estimation on mobile devices

... ] for the “fr3” scenes show that the image-based methods have a higher RPE than the depth-based methods on the textured scenes with low structure and vice-versa for the untextured scenes with low ... Voir le document complet

141

Acoustic echo cancellation for single- and dual-microphone devices : application to mobile devices

Acoustic echo cancellation for single- and dual-microphone devices : application to mobile devices

... prohibitive for a real-time ...filter for a block of input samples (in- stead of every ...state. For all the algorithms mentioned above (LMS, NLMS and APA), the stepsize controls the algorithm ... Voir le document complet

175

Theoretical security evaluation of the Human Semantic Authentication protocol

Theoretical security evaluation of the Human Semantic Authentication protocol

... cause there are no more links between position and value. Unfortunately, there is still a possibility that an installed application with enough privilege can obtain a snapshot of the screen; thus the used keyboard and ... Voir le document complet

9

A novel trust-based authentication scheme for low-resource devices in smart environments

A novel trust-based authentication scheme for low-resource devices in smart environments

... displayed. For more flexibility, the procedure was divided to several steps, to allow the user to use services on his own risk - if he wishes to - when the trustworthiness value is less than the ...EC-SAKA ... Voir le document complet

9

A Testbed Tool for Comparing Usability and Security of Mobile Authentication Mechanisms

A Testbed Tool for Comparing Usability and Security of Mobile Authentication Mechanisms

... of authentication mechanisms for mobile ...environment for assessing three authentication mechanisms, namely: PIN code, Android Pattern Lock and ...of authentication mechanisms ... Voir le document complet

9

Computing Small Pivot-Minors

Computing Small Pivot-Minors

... We focus on the pivot-minor containment relation, defined as follows. The local complementation at a vertex u in a graph G replaces every edge of the subgraph induced by the neighbours of u by a non-edge, and vice versa. ... Voir le document complet

14

Recent Advances in Biometric Technology for Mobile Devices

Recent Advances in Biometric Technology for Mobile Devices

... Since mobile phones are ubiquitous, novel applications are being proposed in the context of mobile biometrics [59], encryption and decryption of digital fingerprint are explored as digital ...from ... Voir le document complet

12

Low Power HEVC Software Decoder for Mobile Devices

Low Power HEVC Software Decoder for Mobile Devices

... II. R ELATED WORK A. HEVC standard The HEVC standard can reach the same subjective video quality than its predecessor H.264/AVC at about half bit- rate [20]. This gain is obtained thanks to new tools adopted in the HEVC ... Voir le document complet

12

Accurate, Low-Energy Trajectory Mapping for Mobile Devices

Accurate, Low-Energy Trajectory Mapping for Mobile Devices

... system for trajectory map- ping using raw position tracks obtained largely from cellular base station ...consumed for trajectory mapping is ...even devices with no GPS or WiFi (constituting a ... Voir le document complet

15

LOW POWER SOFTWARE HEVC DECODER DEMO FOR MOBILE DEVICES

LOW POWER SOFTWARE HEVC DECODER DEMO FOR MOBILE DEVICES

... portable devices to support a wide range of applications from telecommunications to multimedia ...on mobile is expected to exceed 70 % of the internet traffic in 2016, it is crucial for the ... Voir le document complet

3

Dietcoin: Hardening Bitcoin Transaction Verification Process For Mobile Devices

Dietcoin: Hardening Bitcoin Transaction Verification Process For Mobile Devices

... Dietcoin protocol [4, 5] with its associated diet nodes that bridge the security gap between full nodes and SPV ...costs. For both scenarios, a visitor merely needs to either click the “restart” button, to ... Voir le document complet

5

Dependability Evaluation of Cooperative Backup Strategies for Mobile Devices

Dependability Evaluation of Cooperative Backup Strategies for Mobile Devices

... Several papers analyze data dependability in dis- tributed and peer-to-peer storage systems. The authors of OceanStore conducted an analytical evaluation of the MTTF (mean time to failure) of a distributed, self-re- ... Voir le document complet

9

Toward privacy in IoT mobile devices for activity recognition

Toward privacy in IoT mobile devices for activity recognition

... Figure 1: Architecture of our framework: the user smartphone is leveraged to extract relevant features and only these features are uploaded periodically to the application server. practitioner monitoring the patient ... Voir le document complet

7

An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards

An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards

... Cloud Computing I. I NTRODUCTION Nowadays RADIUS (Remote Authentication Dial In User Service) protocol [16] is widely used by Internet Service Providers (ISPs) or companies to grant access to ... Voir le document complet

7

A Context-Aware Broadcast Protocol for Mobile Wireless Networks

A Context-Aware Broadcast Protocol for Mobile Wireless Networks

... A broadcast protocol which require only one hop of neighborhood information. Except from Simple Flood- ing (a node that receives a broadcast message will forward it one single time), broadcast protocols require ... Voir le document complet

11

AMC: AutoML for Model Compression and Acceleration on Mobile Devices

AMC: AutoML for Model Compression and Acceleration on Mobile Devices

... Comparison with Heuristic Channel Reduction. Here we compare AMC with existing state-of-the-art channel reduction methods: FP [31], RNP [33] and SPP [49]. All the methods proposed a heuristic strategy to design the ... Voir le document complet

18

Analysis of mutual information for informative forecasting using mobile sensors

Analysis of mutual information for informative forecasting using mobile sensors

... ∂T I(V T ; Z [0,t] )), which represents the rate of change of sensitivity over time as measurements are being taken. Since the sensitivity is written as a function of covariance matrices, its time derivative will be ... Voir le document complet

7

Show all 10000 documents...