Search Results - "Reis Bezerra, Wesley"
-
1
Performance of security options for message protocols: A comparative analysis
Published in International journal of network management (01-09-2024)“…We explore the challenges around security configuration and performance while utilizing publish–subscribe protocols in the Internet of Things, edge computing,…”
Get full text
Journal Article -
2
Advances in Distributed Load Orchestration for Vision Computing in 5G-MEC Environments
Published in 2023 International Conference on Information Networking (ICOIN) (11-01-2023)“…Multi-access Edge Computing (MEC) is a type of network architecture that provides cloud computing capabilities at the edge of the network. We consider the use…”
Get full text
Conference Proceeding -
3
An Experimentation on CoAP Multi Factor Authentication Mechanism with Reputation for Internet of Things Constrained Devices and Low Power Wide Area Network
Published in 2023 International Conference on Information Networking (ICOIN) (11-01-2023)“…The security of constrained devices in Internet of Things presents itself as a challenge due to the limitation of existing resources. It is important to…”
Get full text
Conference Proceeding -
4
Trends, Opportunities, and Challenges in Using Restricted Device Authentication in Fog Computing
Published 26-09-2022“…The few resources available on devices restricted in Internet of Things are an important issue when we think about security. In this perspective, our work…”
Get full text
Journal Article -
5
A Comparative Qualitative and Quantitative Analysis of the Performance of Security Options for Message Protocols: Fog Computing Scenario
Published 23-10-2022“…We analyze the utilization of publish-subscribe protocols in IoT and Fog Computing and challenges around security configuration, performance, and qualitative…”
Get full text
Journal Article -
6
Models of Computing as a Service and IoT: an analysis of the current scenario with applications using LPWAN
Published 12-05-2021“…Revista de Sistemas de Informacao da FSMA, 25:56-65, 2020 This work provides the basis to understand and select Cloud Computing models applied for the…”
Get full text
Journal Article -
7
A Bibliometrics Analysis on 28 years of Authentication and Threat Model Area
Published 26-09-2022“…The large volume of publications in any research area can make it difficult for researchers to track their research areas' trends, challenges, and…”
Get full text
Journal Article -
8
Characteristics and Main Threats about Multi-Factor Authentication: A Survey
Published 26-09-2022“…This work reports that the Systematic Literature Review process is responsible for providing theoretical support to research in the Threat Model and…”
Get full text
Journal Article