We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 21-40 of 10,000 results
  1. Networking and cryptography library with a non-repudiation flavor for blockchain

    Blockchain is currently one of the most widely discussed inventions in the information and communication technology industry. It is a pillar of the...

    Mohamed Rasslan, Mahmoud M. Nasreldin, ... Heba Aslan in Journal of Computer Virology and Hacking Techniques
    Article Open access 05 August 2023
  2. Freight tour synthesis based on entropy maximization with fuzzy logic constraints

    This paper presents an improved entropy-based freight tour synthesis (FTS) using fuzzy logic (FL). One approach used in formulating FTS models is...

    Diana P. Moreno-Palacio, Carlos A. Gonzalez-Calderon, ... John Jairo Posada-Henao in Transportation
    Article 21 July 2023
  3. Evidence-Based Intervention (EBI) Map**: a systematic approach to understanding the components and logic of EBIs

    Background

    Despite the development of numerous evidence-based interventions (EBIs), many go unused in practice. Hesitations to use existing EBIs may...

    Timothy J. Walker, Maya Foster, ... Maria E. Fernández in BMC Public Health
    Article Open access 07 July 2022
  4. Proving authentication property of PUF-based mutual authentication protocol based on logic of events

    PUF (Physical unclonable function) is a new hardware security primitive, and the research on PUFs is one of the emerging research focuses. For...

    Jiawen Song, Meihua **ao, ... Haoyang Zhou in Soft Computing
    Article Open access 12 November 2021
  5. SLAKA_CPS: Secured lightweight authentication and key agreement protocol for reliable communication among heterogenous devices in cyber-physical system framework

    The rapid expansion of Cyber-Physical Systems (CPS) is crucial for enhancing connectivity in the smart world. Encompassing smart homes, cities,...

    S. Ramya, Manivannan Doraipandian, Rengarajan Amirtharajan in Peer-to-Peer Networking and Applications
    Article 01 June 2024
  6. Can Non-classical Logic Treat Mathematics as Exceptional?

    The paper criticizes a ‘lazy’ strategy popular amongst contemporary advocates of non-classical logic motivated by non-mathematical phenomena (e.g....
    Chapter 2024
  7. Where Policy and Culture Collide: Perceptions and Responses of Swidden Farmers to the Burn Ban in West Kalimantan, Indonesia

    Catastrophic uncontrolled fires are a leading social-environmental challenge that now occur even in the humid tropics. In 2015 extensive Indonesian...

    Willy Daeli, Rachel Carmenta, ... Alison E. Adams in Human Ecology
    Article 19 March 2021
  8. An authentication mechanism based on blockchain for IoT environment

    The Internet of Things (IoT) is a network where physical objects with unique addresses can connect and communicate with each other through the...

    Gholam Reza Zargar, Hamid Barati, Ali Barati in Cluster Computing
    Article 24 June 2024
  9. Secure privacy-enhanced fast authentication and key management for IoMT-enabled smart healthcare systems

    The smart healthcare system advancements have introduced the Internet of Things, enabling technologies to improve the quality of medical services....

    Sriramulu Bojjagani, Denslin Brabin, ... Umamaheswararao Batta in Computing
    Article 07 May 2024
  10. Proxy signature-based role delegation scheme: formal analysis and simulation

    In the security domain, wide variety of signature schemes are available for providing confidentiality, Integrity and non-repudiation. Proxy signature...

    Aparna Bannore, Rachana Y. Patil, ... Himani Deshpande in International Journal of Information Technology
    Article 14 May 2024
  11. RETRACTED ARTICLE: Improved RFID mutual authentication protocol against exhaustive attack in the context of big data

    The development of big data has epromoted the development of Internet technology, but it has brought more network security and privacy problems....

    Article Open access 31 January 2024
  12. Secret sharing based RFID protocol using ECC for TMIS

    With the moderate and constant advancement of the smart internet of things (IoT) and the propagation of 5 G correspondence innovation, the security...

    Haradhan Ghosh, Pramod Kumar Maurya, Satya Bagchi in Peer-to-Peer Networking and Applications
    Article 09 January 2024
  13. A signcryption with identity-based authentication for secure EHR sharing in IoMT utilizing ECC

    Due to real-time data sharing in the Internet of Medical Things (IoMT), the healthcare sector has evolved significantly in recent years. However,...

    Rachana Y. Patil, Arijit Karati, Yogesh H. Patil in International Journal of Information Technology
    Article 02 July 2024
  14. Anonymous and robust biometric authentication scheme for secure social IoT healthcare applications

    In the era of rapid technological advancement, the Internet of Things (IoT) has revolutionised healthcare through systems like the Telecare Medicine...

    T. Arpitha, Dharamendra Chouhan, J. Shreyas in Journal of Engineering and Applied Science
    Article Open access 03 January 2024
  15. Normalisation and subformula property for a system of intuitionistic logic with general introduction and elimination rules

    This paper studies a formalisation of intuitionistic logic by Negri and von Plato which has general introduction and elimination rules. The...

    Nils Kürbis in Synthese
    Article Open access 13 October 2021
  16. Normalisation and subformula property for a system of classical logic with Tarski’s rule

    This paper considers a formalisation of classical logic using general introduction rules and general elimination rules. It proposes a definition of...

    Article Open access 31 May 2021
  17. Security, Disinformation and Harmful Narratives: RT and Sputnik News Coverage about Sweden

    It is a well-known fact both among scholars of propaganda and disinformation, and among political leaders that Sputnik and RT are using their news...

    Book Open access 2024
  18. Sentential Logic Languages ∑

    The fourth chapter begins the construction of a series of named formal languages, beginning with a formal language for sentential logic. The logical...
    Odysseus Makridis in Symbolic Logic
    Chapter 2022
  19. Provable secure authentication key agreement for wireless body area networks

    Wireless body area networks (WBANs) guarantee timely data processing and secure information preservation within the range of the wireless access...

    Yuqian Ma, Wenbo Shi, ... Qingfeng Cheng in Frontiers of Computer Science
    Article 23 December 2023
  20. A Lightweight Two-Factor Continuous Authentication Protocol for Agricultural IoT Devices

    The rapid development of Internet of Things (IoT) technology has led to increased attention to its potential applications in agriculture. IoT-based...

    Tao Wan, **g**g Ge, ... Haixia Zhao in Wireless Personal Communications
    Article 01 May 2024
Did you find what you were looking for? Share feedback.