Search
Search Results
-
SLAKA_CPS: Secured lightweight authentication and key agreement protocol for reliable communication among heterogenous devices in cyber-physical system framework
The rapid expansion of Cyber-Physical Systems (CPS) is crucial for enhancing connectivity in the smart world. Encompassing smart homes, cities,...
-
A Lightweight authentication approach based on linear feedback shift register and majority function for internet of things
Internet of Things (IoT) is a ubiquitous network of connected physical objects with unique identity (ID), which can be controlled through a variety...
-
Lower rounds lattice-based anonymous AKA under the seCK model for the IoT
The authenticated key agreement (AKA) method used in the Internet of Things (IoT) provides identity authentication and agreed symmetric keys to...
-
A Bilinear Map** Based Ring Signature Scheme with Batch Verification for Applications in VANETs
Nowadays, the traditional transportation systems are being replaced by the Vehicular Ad-hoc Networks (VANETs) based intelligent transportation...
-
Reflections on Real Options Valuation Approach to Sustainable Capital Budgeting Practice
Purpose: Business exists to create value for society. One factor that is often overlooked in business valuation is the real options value that a... -
Fuzzy Investment Assessment Techniques: A State-of-the-Art Literature Review
Investment analysis is the process of choosing the most appropriate investment alternative that creates the highest profitability with minimal risk.... -
Secure and lightweight authentication protocol for anonymous data access in cloud assisted IoT system
Rapid evolution of IoT technologies has virtually made connectivity of all the real world objects to the internet possible with the help of tiny...
-
Recalcitrant organic residue compositions and the resource recovery from a food waste treatment facility
The necessity to mitigate the environmental impact of recalcitrant organic residues (RORs) and harness the valuable bio-energy products has...
-
A lightweight and anonymous mutual authentication and key agreement scheme for WBAN
In the medical field, a wearable body area network is a wireless network in which wearable sensors are implemented in or on patients' bodies to...
-
Bsfra: Blockchain based smart forward-reverse agrichain
The agriculture supply chain is an integral part of the whole agriculture sector. A top-notch cost efficient supply chain management system that can...
-
Design of anonymous authentication scheme for vehicle fog services using blockchain
With the advances in smart vehicles and fog computing, Fog computing is extended to traditional Vehicular Ad Hoc Networks (VANETs). As a...
-
4F-MAKA: Four-factor mutual authentication and key agreement protocol for internet of things
The Internet of Things (IoT), a popular technology that has revolutionized the concept of smart gadgets by bringing the world together, uses the...
-
A Robust Four-Factor Authentication Protocol for Resource Mining
Resource mining is the basic necessity for a country’s technological and economic development. Rare-earth elements reshape the economy of a country....
-
A secure and efficient authentication protocol for wireless applications in multi-server environment
User authentication over a public channel is an indispensable requirement in preventing any untrusted third party from accessing the services....
-
SAMAKA: Secure and Anonymous Mutual Authentication and Key Agreement Scheme for Wireless Body Area Networks
The burgeoning advances in wireless communications, healthcare facilities, and sensor technologies bring a lot of transformation in businesses, the...
-
\(TBGODP^+\): improvement of TBGODP, a time bound group ownership delegation protocol
One of the challenging issues in RFID systems is the issue of group ownership transfer and ownership duration. To answer this need recently one...
-
A provably secure RFID authentication protocol based on ECQV for the medical internet of things
Radio Frequency Identification (RFID) is an emerging technology that is used for the unique identification of objects. RFID can be used in different...
-
EPSAPI: An efficient and provably secure authentication protocol for an IoT application environment
With the increasing and rapid deployment of the Internet of Things (IoT), it has become necessary to design an efficient secure user authentication...
-
Evaluation of the Influence of Overturning Parameters on Run-Off-the-Road Vehicles in Vertical Curves
This research seeks to solve the problems of vertical curves with a foreslope using a more suitable model than the point mass model. In this regard,...
-
Secret sharing based RFID protocol using ECC for TMIS
With the moderate and constant advancement of the smart internet of things (IoT) and the propagation of 5 G correspondence innovation, the security...