We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 5,536 results
  1. SLAKA_CPS: Secured lightweight authentication and key agreement protocol for reliable communication among heterogenous devices in cyber-physical system framework

    The rapid expansion of Cyber-Physical Systems (CPS) is crucial for enhancing connectivity in the smart world. Encompassing smart homes, cities,...

    S. Ramya, Manivannan Doraipandian, Rengarajan Amirtharajan in Peer-to-Peer Networking and Applications
    Article 01 June 2024
  2. A Lightweight authentication approach based on linear feedback shift register and majority function for internet of things

    Internet of Things (IoT) is a ubiquitous network of connected physical objects with unique identity (ID), which can be controlled through a variety...

    Elham Ebrahimpour, Shahram Babaie in Peer-to-Peer Networking and Applications
    Article 07 June 2023
  3. Lower rounds lattice-based anonymous AKA under the seCK model for the IoT

    The authenticated key agreement (AKA) method used in the Internet of Things (IoT) provides identity authentication and agreed symmetric keys to...

    Guanglu Wei, Kai Fan, ... Yintang Yang in Peer-to-Peer Networking and Applications
    Article 17 April 2024
  4. A Bilinear Map** Based Ring Signature Scheme with Batch Verification for Applications in VANETs

    Nowadays, the traditional transportation systems are being replaced by the Vehicular Ad-hoc Networks (VANETs) based intelligent transportation...

    Lalit Negi, Devender Kumar in Wireless Personal Communications
    Article 01 February 2024
  5. Reflections on Real Options Valuation Approach to Sustainable Capital Budgeting Practice

    Purpose: Business exists to create value for society. One factor that is often overlooked in business valuation is the real options value that a...
    Conference paper 2023
  6. Fuzzy Investment Assessment Techniques: A State-of-the-Art Literature Review

    Investment analysis is the process of choosing the most appropriate investment alternative that creates the highest profitability with minimal risk....
    Cengiz Kahraman, Basar Oztaysi, ... Selcuk Cebi in Innovations in Bio-Inspired Computing and Applications
    Conference paper 2023
  7. Secure and lightweight authentication protocol for anonymous data access in cloud assisted IoT system

    Rapid evolution of IoT technologies has virtually made connectivity of all the real world objects to the internet possible with the help of tiny...

    Vinod Mahor, R. Padmavathy, Santanu Chatterjee in Peer-to-Peer Networking and Applications
    Article 14 December 2023
  8. Recalcitrant organic residue compositions and the resource recovery from a food waste treatment facility

    The necessity to mitigate the environmental impact of recalcitrant organic residues (RORs) and harness the valuable bio-energy products has...

    Abdulmoseen Segun Giwa, Heng Xu, ... Kaijun Wang in Journal of Material Cycles and Waste Management
    Article 21 April 2021
  9. A lightweight and anonymous mutual authentication and key agreement scheme for WBAN

    In the medical field, a wearable body area network is a wireless network in which wearable sensors are implemented in or on patients' bodies to...

    Saba Marandi, Farokhlagha Moazami, Amir Malekinezhad in Peer-to-Peer Networking and Applications
    Article 23 May 2024
  10. Bsfra: Blockchain based smart forward-reverse agrichain

    The agriculture supply chain is an integral part of the whole agriculture sector. A top-notch cost efficient supply chain management system that can...

    Rishikesh, Ditipriya Sinha in Peer-to-Peer Networking and Applications
    Article 12 April 2024
  11. Design of anonymous authentication scheme for vehicle fog services using blockchain

    With the advances in smart vehicles and fog computing, Fog computing is extended to traditional Vehicular Ad Hoc Networks (VANETs). As a...

    **nrui Duan, Yajun Guo, Yimin Guo in Wireless Networks
    Article 17 August 2023
  12. 4F-MAKA: Four-factor mutual authentication and key agreement protocol for internet of things

    The Internet of Things (IoT), a popular technology that has revolutionized the concept of smart gadgets by bringing the world together, uses the...

    Diksha Rangwani, Hari Om in Peer-to-Peer Networking and Applications
    Article 20 September 2022
  13. A Robust Four-Factor Authentication Protocol for Resource Mining

    Resource mining is the basic necessity for a country’s technological and economic development. Rare-earth elements reshape the economy of a country....

    Diksha Rangwani, Hari Om in Arabian Journal for Science and Engineering
    Article 23 July 2022
  14. A secure and efficient authentication protocol for wireless applications in multi-server environment

    User authentication over a public channel is an indispensable requirement in preventing any untrusted third party from accessing the services....

    Pankaj Kumar, Hari Om in Peer-to-Peer Networking and Applications
    Article 11 May 2022
  15. SAMAKA: Secure and Anonymous Mutual Authentication and Key Agreement Scheme for Wireless Body Area Networks

    The burgeoning advances in wireless communications, healthcare facilities, and sensor technologies bring a lot of transformation in businesses, the...

    Bhawna Narwal, Amar Kumar Mohapatra in Arabian Journal for Science and Engineering
    Article 15 June 2021
  16. \(TBGODP^+\): improvement of TBGODP, a time bound group ownership delegation protocol

    One of the challenging issues in RFID systems is the issue of group ownership transfer and ownership duration. To answer this need recently one...

    Farokhlagha Moazami, Masoumeh Safkhani in Journal of Ambient Intelligence and Humanized Computing
    Article 21 November 2021
  17. A provably secure RFID authentication protocol based on ECQV for the medical internet of things

    Radio Frequency Identification (RFID) is an emerging technology that is used for the unique identification of objects. RFID can be used in different...

    Abhay Kumar Agrahari, Shirshu Varma in Peer-to-Peer Networking and Applications
    Article 05 March 2021
  18. EPSAPI: An efficient and provably secure authentication protocol for an IoT application environment

    With the increasing and rapid deployment of the Internet of Things (IoT), it has become necessary to design an efficient secure user authentication...

    Bahaa Hussein Taher Algubili, Neeraj Kumar, ... Huiyu Liu in Peer-to-Peer Networking and Applications
    Article 27 June 2022
  19. Evaluation of the Influence of Overturning Parameters on Run-Off-the-Road Vehicles in Vertical Curves

    This research seeks to solve the problems of vertical curves with a foreslope using a more suitable model than the point mass model. In this regard,...

    Ali Attari, Ali Abdi Kordani, ... Mohammad Worya Khordehbinan in Iranian Journal of Science and Technology, Transactions of Civil Engineering
    Article 03 September 2023
  20. Secret sharing based RFID protocol using ECC for TMIS

    With the moderate and constant advancement of the smart internet of things (IoT) and the propagation of 5 G correspondence innovation, the security...

    Haradhan Ghosh, Pramod Kumar Maurya, Satya Bagchi in Peer-to-Peer Networking and Applications
    Article 09 January 2024
Did you find what you were looking for? Share feedback.