Now showing items 1-10 of 13
Impact of Network and Host Characteristics on the Keystroke Pattern in Remote Desktop Sessions
Authentication based on keystroke dynamics is a convenient biometric approach, easy in use, transparent, and cheap as it does not require a dedicated sensor. Keystroke authentication, as part of multi factor authentication, ...
The Challenges with Internet of Things for Business
Many companies consider IoT as a central element for increasing competitiveness. Despite the growing number of cyberattacks on IoT devices and the importance of IoT security, no study has yet primarily focused on the impact ...
High Throughput WMN for the Communication in Disaster Scenario
The Wireless mesh network (WMN) is a popular network architecture used to support disaster recovery operations. However, few research works have addressed the capacity problem of such a network. This is due to the assumption ...
A Survey Investigating the Combination and Number of IMUs on the Human Body Used for Detecting Activities and Human Tracking
In the present paper we give a classification of the position and the number of inertial measurement units (IMU) used to detect human activities and position tracking based on literature review. It presents a separate view ...
Possible Challenges and Appropriate Measures for a Resilient WMN-Based Disaster Network
A wireless mesh network (WMN)-based disaster network shall provide an emergency communication infrastructure in case of a catastrophe destroyed any existing communication infrastructure. Since the hardware of the disaster ...
Trusted, Decentralized and Blockchain-Based M2M Application Service Provision
(Springer International Publishing, 2020)
Decentralized M2M service platforms enable the integration of end-user-based M2M applications and end-user-located M2M resources without the use of central entities or components in the system architecture. Sharing ...
Distributed ledger technology for trust management optimisation in M2M
Decentralised environments with a high number of end-users and M2M devices used in several M2M services increase the importance of a secure trust management and comprehensive trust evaluation system to avoid frauds from ...
Comparative Analysis of Cryptographic Key Management Systems.