Search
Search Results
-
Secure and lightweight authentication protocol for anonymous data access in cloud assisted IoT system
Rapid evolution of IoT technologies has virtually made connectivity of all the real world objects to the internet possible with the help of tiny...
-
Capital Logic and Spatial Management
If the production of absolute surplus value reflects more time management, then the production of relative surplus value is directly related to... -
PF-AKA: PUF-FSM based Authentication and Key Agreement Framework for IoT based Smart Grid Networks
Internet of Things (IoTs) is a promising technology that combines communication and data networking. Integration of Smart Grids (SGs) and IoT will...
-
An improved lattice based certificateless data integrity verification techniques for cloud computing
Today, cloud computing security schemes face many challenges, risks, and pitfalls. Digital signatures are vital security measures that must not be...
-
A password less authentication protocol for multi-server environment using physical unclonable function
Password-based authentication is the most commonly used method to authenticate users to get online services. In password-based authentication, the...
-
An ECC-based mutual data access control protocol for next-generation public cloud
Through the broad usage of cloud computing and the extensive utilization of next-generation public clouds, people can share valuable information...
-
LGAAFS: A lightweight group anonymous mutual authentication and forward security scheme for wireless body area networks
Wireless Body Area Network (WBAN) plays an important role in the modern telemedicine environment. In WBAN, intelligent and resource-limited sensors...
-
LAPEP—Lightweight Authentication Protocol with Enhanced Privacy for effective secured communication in vehicular ad-hoc network
Vehicular ad-hoc network (VANET) plays a vital role in emerging Intelligent Transportation System (ITS). VANET’s deal with the group of network that...
-
A secure lightweight mutual authentication scheme in Social Industrial IoT environment
The Social Industrial Internet of Things (SIIoT) is a new paradigm that integrates social networking features into the Industrial IoT (IIoT)...
-
Smart Card Based Remote User Authentication Scheme in Multi-server Environment Using Chebyshev Chaotic Map
In order to authenticate remote users for a distributed network-operated system, remote user authentication is crucial. A huge number of enterprise...
-
A Blockchain-Assisted Lightweight Anonymous Authentication Scheme for Medical Services in Internet of Medical Things
Internet of medical things (IoMT) enable physicians to provide precise care on the Internet for registered patients anywhere, bringing convenience to...
-
Chaotic map based multi-factor authentication protocol for underwater environment monitoring
The underwater environment holds significant potential for advancing ecosystem understanding, industrial operations, and early natural disaster...
-
An efficient three-factor authentication protocol for wireless healthcare sensor networks
Wireless Sensor Networks (WSNs) play a significant role in the health care industry in this digitised world. This technology is used to monitor and...
-
A Fuzzy Logic-Based Intrusion Detection System for WBAN Against Jamming Attacks
Wireless Body Area Network (WBAN) is a set of special nodes called medical sensors. These sensors are very useful and helpful for making the user... -
A three-phase framework for secure storage and sharing of healthcare data based on blockchain, IPFS, proxy re-encryption and group communication
In recent years, the popularity of blockchain application in healthcare sector has increased manifold due to features such as decentralized...
-
SE-LAKAF: Security enhanced lightweight authentication and key agreement framework for smart grid network
The Smart Grid (SG) improves the reliability and efficiency of the data sharing and communication of the traditional power grid system. This...
-
REACH: Robust Efficient Authentication for Crowdsensing-based Healthcare
Crowdsensing systems use a group of people to collect and share sensor data for various tasks. One example is the crowdsensing-based healthcare...
-
An anonymous mutual authentication and key agreement scheme in WMSN using physiological data
Wireless medical sensor network (WMSN) is an application of the Internet of Things (IoT) that plays a very important role in today’s era for the...
-
A lightweight and anonymous mutual authentication and key agreement scheme for WBAN
In the medical field, a wearable body area network is a wireless network in which wearable sensors are implemented in or on patients' bodies to...
-
Application of Mathematical Logic in Modern Design
Rationality and sensibility have been complementing and restricting each other in the process of design. Mathematicians have used mathematics for...