ListarLCC - Artículos por tema "Security"
Mostrando ítems 1-6 de 6
-
A trust model for popular smart home devices
(Springer, 2021-08)Nowadays, smart home devices like Amazon Echo and Google Home have reached mainstream popularity. Being in the homes of users, these devices are intrinsically intrusive, being able to access details such as users’ name, ... -
Edge-Assisted Vehicular Networks Security.
(2019)Edge Computing paradigms are expected to solve some major problems affecting current application scenarios that rely on Cloud computing resources to operate. These novel paradigms will bring computational resources ... -
Immune system for the internet of things using edge technologies
(2018-08-29)The Internet of Things (IoT) and Edge Computing are starting to go hand in hand. By providing cloud services close to end-users, edge paradigms enhance the functionality of IoT deployments, and facilitate the creation ... -
Private set intersection: A systematic literature review
(Elsevier, 2023)Secure Multi-party Computation (SMPC) is a family of protocols which allow some parties to compute a function on their private inputs, obtaining the output at the end and nothing more. In this work, we focus on a particular ... -
SAMGRID: Security Authorization and Monitoring Module Based on SealedGRID Platform
(IOAP-MPDI, 2022-08-30)IoT devices present an ever-growing domain with multiple applicability. This technology has favored and still favors many areas by creating critical infrastructures that are as profitable as possible. This paper presents ... -
TrUStAPIS: a trust requirements elicitation method for IoT
(Springer Link, 2020-02-01)The internet of things (IoT) is an environment of interconnected entities, which are identifiable, usable and controllable via the Internet. Trust is useful for a system such as the IoT as the entities involved would like ...