VO Nyangaresi - 2021 International Symposium ELMAR, 2021 - ieeexplore.ieee.org
Smart homes security has attracted a lot of attention from both the industry and academia, leading to the development of numerous schemes for both key management and …
The phenomenal increase in the usage of Internet promotes the quality of trust in the scope of the Internet of Things (IoT). Trust is beneficial in the provision of an effective, reliable …
Usable security involves designing security measures that accommodate users' needs and behaviors. Balancing usability and security poses challenges: the more secure the systems …
IU Din, S Hassan, A Almogren, F Ayub… - Future Generation …, 2020 - Elsevier
The future Internet, known as Information-Centric Networking (ICN), is a realistic solution to content delivery between the content request generators (subscribers) and the server …
Traditional identity verification of students based on the human proctoring approach can cause a scam identity verification and ineffective processing time, particularly among vast …
Internet of Things (IoT) is bringing a revolution in today's world where devices in our surroundings become smart and perform daily-life activities and operations with more …
In Vehicular Ad-hoc Networks (VANET), vehicles act like mobile nodes for fetching, sharing, and disseminating important information related to vehicle safety, warning messages …
The emergence of augmented reality (AR) and virtual reality (VR) has revolutionized the trends in computing devices and modern technologies drastically. With this revolution, there …
User authentication is a critical security requirement for accessing resources in cloud computing systems. A text-based password is a standard user authentication way and it is …