Showing all 2 results

  • A User Authentication Scheme of IoT Devices using Blockchain-enabled Fog Nodes

    0 out of 5
    4,500

    A User Authentication Scheme of IoT Devices using Blockchain-enabled Fog Nodes Abstract-These days, IoT devices are deployed at a massive scale, with Cisco predicting 20 billion devices by the year 2020. As opposed to endpoint devices, IoT devices are resource-constrained devices, incapable of securing and defending themselves, and can be easily hacked and compromised. Fog…

  • Cloud Centric Authentication for Wearable Healthcare Monitoring System

    0 out of 5
    4,500

    Cloud Centric Authentication for Wearable Healthcare Monitoring System Abstract-Security and privacy are the major concerns in cloud computing as users have limited access on the stored data at the remote locations managed by different service providers.These become more challenging especially for the data generated from the wearable devices as it is highly sensitive and heterogeneous…

End of content

End of content