Keywords: Security architectures; Constrained environments; IETF; OSCAR; Object security; COSE; ACE; DCAF; OAuth; DTLS; Kerberos; MQTT-SN; IPsec; SSH; OSCOAP;
مقالات ISI (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: SDN; NFV; 5G; Telecommunication; Security; Mobile networks; IPsec; HIP; OpenFlow;
Keywords: ADC; Analog to digital converter; ADVISE; Adversary view security evaluation; AES; Advanced encryption standard; AGC; auto gain control; AIM; Artificial intelligent met; AMI; Automatic metering infrastructure; AVISPA; Automated validation of internet secu
6LowPSec: An end-to-end security protocol for 6LoWPAN
Keywords: Internet of Things; 6LoWPAN; End-to-end security; IPSec; IEEE 802.15.4; Routing protocols;
Lightweight key agreement protocol for IoT based on IKEv2
Keywords: IPSec; IKEv2; Key agreement; Authentication; End-to-end security;
Secure collaborative system in heterogenous wireless sensor networks
Keywords: IPsec; 6LoWPAN; IKEv2; Security; HWSNs
A high-speed unified hardware architecture for 128 and 256-bit security levels of AES and the SHA-3 candidate Grøstl
Keywords: SHA-3 competition; Hardware architectures; Grøstl; AES; Resource sharing; Pipelining; Scheduling; IPSec
RIPsec – Using reputation-based multilayer security to protect MANETs
Keywords: MANET; Ad-hoc; IPsec; DSR; Multipath; Behavior grading; Reputation; Trust; PKI
Wireless mesh network security: A traffic engineering management approach
Keywords: Traffic engineering; Wireless mesh networks; Security; MPLS; VPN; IPSec
A network-assisted mobile VPN for securing users data in UMTS
Keywords: Mobile VPN; UMTS; IPsec; IKEv2; Mobile security
Uncovering identities: A study into VPN tunnel fingerprinting
Keywords: IPSec; Internet Key Exchange (IKE); Fingerprinting; Traffic analysis; Virtual Private Network (VPN)
A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms
Keywords: Security performance; Computational overhead; Space overhead; IPsec; DES; AES; MD5; SHA-1; Mobile devices