Search
Search Results
-
A Lightweight Two-Factor Continuous Authentication Protocol for Agricultural IoT Devices
The rapid development of Internet of Things (IoT) technology has led to increased attention to its potential applications in agriculture. IoT-based...
-
3S-ALDDT: A Triple Security Scheme for Authenticating Lightweight Devices and Securing Data Transmission in Internet of Things
The Internet of Things (IoT) connect and link objects and people for creating, processing and sharing countless information. The use of IoT is widely...
-
It Didn’t Have to be This Way Reflections on the Ethical Justification of the Running Ban in Northern Italy in Response to the 2020 COVID-19 Outbreak
In this paper I discuss the ethical justifiability of the limitation of freedom of movement, in particular of the ban on running outdoors, enforced...
-
Enhanced secure and efficient mutual authentication protocol in IoT-based energy internet using blockchain
Energy Internet (EI) has emerged as a promising paradigm for integrating various smart grid technologies through the Internet to provide reliable and...
-
Quadratic residue-based unilateral authentication protocol for RFID system
Nowadays, Radio frequency identification (RFID) plays an important role in many real-life applications for remotely identifying objects. RFID system...
-
Community-Based Wildlife Conservation on Pastoral Lands in Kenya: A New Logic of Production with Implications for the Future of Pastoralism
Community-based wildlife conservation has been identified as a potentially successful approach to meet the needs of wildlife and the interests of...
-
A Lightweight Authentication Protocol for a Blockchain-Based Off-Chain Medical Data Access in Multi-server Environment
Presently, blockchain technology is used to secure electronic medical records (EMR) and an arrangement of multiple servers as off-chain storage is...
-
Proof-Theoretical System for Predicate Logic: ∏πφ=
The eighth chapter explores proof-theoretical systems for predicate logic (natural deduction proof systems), detailing and justifying the elaborate... -
Re-thinking public health: Towards a new scientific logic of routine animal health care in European industrial farming
This study makes the case for a new scientific logic of routine animal health care in industrial farming in Europe. We argue that the social regime...
-
A lightweight certificate-based authentication scheme for 6LoWPAN-based internet of things
As the 6LoWPAN devices in the Internet of Things (IoT) applications communicate sensitive information over the unattended and insecure channel, it is...
-
The Logic of Intolerance
Unfortunately for the advocates of toleration, intolerance has an inescapable logic. Because toleration depends on a modicum of trust, it is hardest... -
A Robust Smart Card based Authentication and Key Agreement Scheme for WSN using Fuzzy Extractor
As Wireless Sensor Networks (WSN) uses the open channel for communication between the end users and the resource-constrained sensors; maintaining...
-
Chrysippus’ Logic in a Natural Deduction Setting
In this paper, we zoom in on some important features of Chrysippus’ logic by framing them in a natural deduction system for relevant logic. Our view... -
Ensure the dynamic identity and PUF based authenticated key settlement approach for the IoT infrastructure
With technological advancements, the dependency on the Internet of things (IoT) has increased. The spectrum of IoT application domain becomes larger...
-
A provably lightweight mutually authentication and key establishment protocol using extended chaotic map for telecare medicine information system
Telecare Medicine Information System (TMIS) provides patient’s efficient and convenient e-healthcare services where the patient private health...
-
A hyperledger fabric-based EMR sharing mechanisms with proxy re-encryption and IPFS
With the advent of the information age, data storage has not only developed from paper information systems to electronic information system storage,...
-
A blockchain assisted multi-gateway authentication scheme for IIoT based on group
The Industrial Internet of Things (IIoT) has been universally applied in all aspects of industrial production, contributing to the development of...
-
A blockchain based lightweight and secure access control framework for IoT-enabled supply chain
To ensure safe exchange of data in IoT-enabled-supply-chain network and safeguard other security issues, IoT devices should have an access control...
-
Immigration, Risk, and Security Under the Trump Administration Kee** ‘Undesirables’ Out
This book explores the immigration policies and practices of the Trump administration, with a specific focus on Trump’s travel ban and the wall along... -
Multi-factor user authentication and key agreement scheme for wireless sensor networks using Chinese remainder theorem
To formulate a secure and efficient user authentication scheme for wireless sensor networks(WSNs) is a complicated task, because sensors are placed...