Security
MQTT-Auth: a Token-based Solution to Endow MQTT with Authentication and Authorization Capabilities
2018| Vol. 14 (4) | Open Call Articles| Pages: 320-331| PDF (1.45 MiB) | 2018-10-30 |0 views| 1 CrossRef citationSecurity Threats in Software Defined Mobile Clouds (SDMC)
2016| Vol. 12 (2) | Open Call Articles| Pages: 105-111| PDF (1.11 MiB) | 2016-06-22 |0 views| 0 CrossRef citationsA Novel Unique Parameter for Increasing of Security in GPON Networks
2016| Vol. 12 (2) | Open Call Articles| Pages: 112-116| PDF (1.37 MiB) | 2016-06-22 |0 views| 1 CrossRef citationAn Efficient and Private Authentication Protocol for RFID Systems
2013| Vol. 9 (2) | Open Call Articles| Pages: 128-136| PDF (875 KiB) | 2013-06-21 |0 views| 1 CrossRef citationSecure Mobile IPv6 for Mobile Networks based on the 3GPP IP Multimedia Subsystem
2007| Vol. 3 (2) | Open Call Articles| Pages: 90-98| PDF (1.32 MiB) | 2007-06-21 |0 views| 0 CrossRef citationsDelPHIX: A Simple and Efficient Mechanism for Wormhole Detection in Ad Hoc Networks
2006| Vol. 2 (2) | Open Call Articles| Pages: 131-140| PDF (543 KiB) | 2017-04-05 |0 views| 0 CrossRef citations