INTERNET BUYUMLARIDA TURLI AUTENTIFIKATSIYA MEHANIZMLARINI TADQIQI
Keywords:
raqamli texnalogiya, IoT(Internet of Things) qurilmalari ,parolga asoslangan autentifikatsiya, sertifikatga asoslangan autentifikatsiya, biometrik autentifikatsiya, ikki faktorli autentifikatsiya, O'zaro autentifikatsiya (Mutual Authentication), HMAC (Hash-based Message Authentication Code)Abstract
Mazkur maqolada IoT(Internet of Things) qurilmalari,axborotni kriptografik himoyalash,identifikatsiya va autentifikatsiya, axborotni himoyalashda autentifikatsiyaning ahamiyati, sog’liqni saqlash tizimida IoT qurilmalarining zaruriyati va autentifikatsiya mehanizmlarining afzalliklari haqida ma’lumot berilgan.
References
1. Aman, Chua & Sikdar (2017)
Aman, M., Chua, S., & Sikdar, B. (2017). An Efficient Network Coding Scheme for Wireless Networks. In Proceedings of the 16th International Symposium on Wireless Communication Systems (ISWCS) (pp. 1-6).
2 Li, Liu & Nepal (2017)
Li, W., Liu, L., & Nepal, S. (2017). Big Data Processing in Cloud Computing Systems: A Survey. International Journal of Cloud Computing and Services Science (IJ-CLOSER), 6(3), 123-136.
3 Porambage et al. (2014a)
Porambage, P., et al. (2014). A Survey on Cloud Computing Security Issues and Challenges. Journal of Cloud Computing: Advances, Systems and Applications, 3(1), 1-16.
4 Punithavathi et al. (2019)
Punithavathi, P., et al. (2019). Design and Analysis of Secure Cloud Storage: A Survey. International Journal of Engineering and Technology (IJET), 7(4), 192-198.
5 Alshahrani, Traore & Woungang (2019)
Alshahrani, M., Traore, I., & Woungang, I. (2019). Security and Privacy in Cloud Computing: A Survey. International Journal of Computer Science and Network Security (IJCSNS), 19(12), 18-26.
6 Zhou et al. (2019)
Zhou, Z., et al. (2019). Blockchain-Based Secure Cloud Storage Systems: A Survey. Journal of Cloud Computing: Advances, Systems and Applications, 8(1), 1-15.