We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 41-60 of 10,000 results
  1. A Lightweight Two-Factor Continuous Authentication Protocol for Agricultural IoT Devices

    The rapid development of Internet of Things (IoT) technology has led to increased attention to its potential applications in agriculture. IoT-based...

    Tao Wan, **g**g Ge, ... Haixia Zhao in Wireless Personal Communications
    Article 01 May 2024
  2. 3S-ALDDT: A Triple Security Scheme for Authenticating Lightweight Devices and Securing Data Transmission in Internet of Things

    The Internet of Things (IoT) connect and link objects and people for creating, processing and sharing countless information. The use of IoT is widely...

    Article 01 March 2024
  3. It Didn’t Have to be This Way Reflections on the Ethical Justification of the Running Ban in Northern Italy in Response to the 2020 COVID-19 Outbreak

    In this paper I discuss the ethical justifiability of the limitation of freedom of movement, in particular of the ban on running outdoors, enforced...

    Silvia Camporesi in Journal of Bioethical Inquiry
    Article Open access 09 November 2020
  4. Enhanced secure and efficient mutual authentication protocol in IoT-based energy internet using blockchain

    Energy Internet (EI) has emerged as a promising paradigm for integrating various smart grid technologies through the Internet to provide reliable and...

    Chahrazed Benrebbouh, Houssem Mansouri, ... Al-Sakib Khan Pathan in Peer-to-Peer Networking and Applications
    Article 25 October 2023
  5. Quadratic residue-based unilateral authentication protocol for RFID system

    Nowadays, Radio frequency identification (RFID) plays an important role in many real-life applications for remotely identifying objects. RFID system...

    Pramod Kumar Maurya, Satya Bagchi in Multimedia Tools and Applications
    Article 15 November 2022
  6. Community-Based Wildlife Conservation on Pastoral Lands in Kenya: A New Logic of Production with Implications for the Future of Pastoralism

    Community-based wildlife conservation has been identified as a potentially successful approach to meet the needs of wildlife and the interests of...

    Carolyn Lesorogol, Prame Lesorogol in Human Ecology
    Article Open access 01 February 2024
  7. A Lightweight Authentication Protocol for a Blockchain-Based Off-Chain Medical Data Access in Multi-server Environment

    Presently, blockchain technology is used to secure electronic medical records (EMR) and an arrangement of multiple servers as off-chain storage is...

    Subhas Barman, Samiran Chattopadhyay, Debasis Samanta in SN Computer Science
    Article 27 February 2024
  8. Proof-Theoretical System for Predicate Logic: ∏πφ=

    The eighth chapter explores proof-theoretical systems for predicate logic (natural deduction proof systems), detailing and justifying the elaborate...
    Odysseus Makridis in Symbolic Logic
    Chapter 2022
  9. Re-thinking public health: Towards a new scientific logic of routine animal health care in European industrial farming

    This study makes the case for a new scientific logic of routine animal health care in industrial farming in Europe. We argue that the social regime...

    Camille Bellet, Lindsay Hamilton, Jonathan Rushton in Humanities and Social Sciences Communications
    Article Open access 20 September 2021
  10. A lightweight certificate-based authentication scheme for 6LoWPAN-based internet of things

    As the 6LoWPAN devices in the Internet of Things (IoT) applications communicate sensitive information over the unattended and insecure channel, it is...

    Leki Chom Thungon, Subhas Chandra Sahana, Md. Iftekhar Hussain in The Journal of Supercomputing
    Article 15 March 2023
  11. The Logic of Intolerance

    Unfortunately for the advocates of toleration, intolerance has an inescapable logic. Because toleration depends on a modicum of trust, it is hardest...
    Reference work entry 2022
  12. A Robust Smart Card based Authentication and Key Agreement Scheme for WSN using Fuzzy Extractor

    As Wireless Sensor Networks (WSN) uses the open channel for communication between the end users and the resource-constrained sensors; maintaining...

    Rituparna Paul, Shanvendra Rai, ... Preetisudha Meher in Peer-to-Peer Networking and Applications
    Article 22 December 2023
  13. Chrysippus’ Logic in a Natural Deduction Setting

    In this paper, we zoom in on some important features of Chrysippus’ logic by framing them in a natural deduction system for relevant logic. Our view...
    Marcello D’Agostino, Mario Piazza in Thinking and Calculating
    Conference paper 2022
  14. Ensure the dynamic identity and PUF based authenticated key settlement approach for the IoT infrastructure

    With technological advancements, the dependency on the Internet of things (IoT) has increased. The spectrum of IoT application domain becomes larger...

    Srabana Pramanik, Deepak S. Sakkari, Sudip Pramanik in Proceedings of the Indian National Science Academy
    Article 19 September 2022
  15. A provably lightweight mutually authentication and key establishment protocol using extended chaotic map for telecare medicine information system

    Telecare Medicine Information System (TMIS) provides patient’s efficient and convenient e-healthcare services where the patient private health...

    Ashish Kamble, Vishesh Gaikwad, Jitendra Tembhurne in International Journal of Information Technology
    Article 24 June 2023
  16. A hyperledger fabric-based EMR sharing mechanisms with proxy re-encryption and IPFS

    With the advent of the information age, data storage has not only developed from paper information systems to electronic information system storage,...

    Der-Chen Huang, Ling-Chun Liu, ... Kuang-Wei Zeng in Cluster Computing
    Article 13 March 2024
  17. A blockchain assisted multi-gateway authentication scheme for IIoT based on group

    The Industrial Internet of Things (IIoT) has been universally applied in all aspects of industrial production, contributing to the development of...

    **n Liu, Miao Wang, ... Ruisheng Zhang in Peer-to-Peer Networking and Applications
    Article 09 October 2022
  18. A blockchain based lightweight and secure access control framework for IoT-enabled supply chain

    To ensure safe exchange of data in IoT-enabled-supply-chain network and safeguard other security issues, IoT devices should have an access control...

    Rashmi Raj, Mohona Ghosh in Peer-to-Peer Networking and Applications
    Article 08 March 2024
  19. Immigration, Risk, and Security Under the Trump Administration Kee** ‘Undesirables’ Out

    This book explores the immigration policies and practices of the Trump administration, with a specific focus on Trump’s travel ban and the wall along...
    William Clapton
    Book 2022
  20. Multi-factor user authentication and key agreement scheme for wireless sensor networks using Chinese remainder theorem

    To formulate a secure and efficient user authentication scheme for wireless sensor networks(WSNs) is a complicated task, because sensors are placed...

    Gaurav Tyagi, Rahul Kumar in Peer-to-Peer Networking and Applications
    Article 17 October 2022
Did you find what you were looking for? Share feedback.