We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 61-80 of 10,000 results
  1. Secure and lightweight authentication protocol for anonymous data access in cloud assisted IoT system

    Rapid evolution of IoT technologies has virtually made connectivity of all the real world objects to the internet possible with the help of tiny...

    Vinod Mahor, R. Padmavathy, Santanu Chatterjee in Peer-to-Peer Networking and Applications
    Article 14 December 2023
  2. Capital Logic and Spatial Management

    If the production of absolute surplus value reflects more time management, then the production of relative surplus value is directly related to...
    Haifeng YANG in The Philosophy of Capital
    Chapter 2023
  3. PF-AKA: PUF-FSM based Authentication and Key Agreement Framework for IoT based Smart Grid Networks

    Internet of Things (IoTs) is a promising technology that combines communication and data networking. Integration of Smart Grids (SGs) and IoT will...

    Prarthana J. Mehta, Balu L. Parne, Sankita J. Patel in Cluster Computing
    Article 06 April 2024
  4. An improved lattice based certificateless data integrity verification techniques for cloud computing

    Today, cloud computing security schemes face many challenges, risks, and pitfalls. Digital signatures are vital security measures that must not be...

    Dilli Babu Salvakkam, Rajendra Pamula in Journal of Ambient Intelligence and Humanized Computing
    Article 26 April 2023
  5. A password less authentication protocol for multi-server environment using physical unclonable function

    Password-based authentication is the most commonly used method to authenticate users to get online services. In password-based authentication, the...

    E. Praveen Kumar, S. Priyanka in The Journal of Supercomputing
    Article 21 June 2023
  6. An ECC-based mutual data access control protocol for next-generation public cloud

    Through the broad usage of cloud computing and the extensive utilization of next-generation public clouds, people can share valuable information...

    Naveed Khan, Zhang Jianbiao, ... Shehzad Ashraf Chaudhry in Journal of Cloud Computing
    Article Open access 08 July 2023
  7. LGAAFS: A lightweight group anonymous mutual authentication and forward security scheme for wireless body area networks

    Wireless Body Area Network (WBAN) plays an important role in the modern telemedicine environment. In WBAN, intelligent and resource-limited sensors...

    Shuangrong Peng, **aohu Tang, ... Hui Zhu in Peer-to-Peer Networking and Applications
    Article 19 August 2023
  8. LAPEP—Lightweight Authentication Protocol with Enhanced Privacy for effective secured communication in vehicular ad-hoc network

    Vehicular ad-hoc network (VANET) plays a vital role in emerging Intelligent Transportation System (ITS). VANET’s deal with the group of network that...

    S. Jayashree, S. V. N. Santhosh Kumar in Wireless Networks
    Article 16 August 2023
  9. A secure lightweight mutual authentication scheme in Social Industrial IoT environment

    The Social Industrial Internet of Things (SIIoT) is a new paradigm that integrates social networking features into the Industrial IoT (IIoT)...

    Arij Ben Amor, Sarra Jebri, ... Aref Meddeb in The Journal of Supercomputing
    Article 27 March 2023
  10. Smart Card Based Remote User Authentication Scheme in Multi-server Environment Using Chebyshev Chaotic Map

    In order to authenticate remote users for a distributed network-operated system, remote user authentication is crucial. A huge number of enterprise...

    Shyamalendu Kandar, Abhipsho Ghosh in Wireless Personal Communications
    Article 01 December 2023
  11. A Blockchain-Assisted Lightweight Anonymous Authentication Scheme for Medical Services in Internet of Medical Things

    Internet of medical things (IoMT) enable physicians to provide precise care on the Internet for registered patients anywhere, bringing convenience to...

    Shu Wu, Aiqing Zhang, ... Ya Gao in Wireless Personal Communications
    Article 03 May 2023
  12. Chaotic map based multi-factor authentication protocol for underwater environment monitoring

    The underwater environment holds significant potential for advancing ecosystem understanding, industrial operations, and early natural disaster...

    Diksha Rangwani, Hari Om in Multimedia Tools and Applications
    Article 05 September 2023
  13. An efficient three-factor authentication protocol for wireless healthcare sensor networks

    Wireless Sensor Networks (WSNs) play a significant role in the health care industry in this digitised world. This technology is used to monitor and...

    Khushil Kumar Saini, Damandeep Kaur, ... Bijendra Kumar in Multimedia Tools and Applications
    Article 12 January 2024
  14. A Fuzzy Logic-Based Intrusion Detection System for WBAN Against Jamming Attacks

    Wireless Body Area Network (WBAN) is a set of special nodes called medical sensors. These sensors are very useful and helpful for making the user...
    Conference paper 2023
  15. A three-phase framework for secure storage and sharing of healthcare data based on blockchain, IPFS, proxy re-encryption and group communication

    In recent years, the popularity of blockchain application in healthcare sector has increased manifold due to features such as decentralized...

    Shweta Mittal, Mohona Ghosh in The Journal of Supercomputing
    Article 13 November 2023
  16. SE-LAKAF: Security enhanced lightweight authentication and key agreement framework for smart grid network

    The Smart Grid (SG) improves the reliability and efficiency of the data sharing and communication of the traditional power grid system. This...

    Prarthana J. Mehta, Balu L. Parne, Sankita J. Patel in Peer-to-Peer Networking and Applications
    Article 19 May 2023
  17. REACH: Robust Efficient Authentication for Crowdsensing-based Healthcare

    Crowdsensing systems use a group of people to collect and share sensor data for various tasks. One example is the crowdsensing-based healthcare...

    Mahdi Nikooghadam, Haleh Amintoosi, Hamid Reza Shahriari in The Journal of Supercomputing
    Article 22 November 2023
  18. An anonymous mutual authentication and key agreement scheme in WMSN using physiological data

    Wireless medical sensor network (WMSN) is an application of the Internet of Things (IoT) that plays a very important role in today’s era for the...

    Shanvendra Rai, Rituparna Paul, ... Preetisudha Meher in Wireless Networks
    Article 06 March 2024
  19. A lightweight and anonymous mutual authentication and key agreement scheme for WBAN

    In the medical field, a wearable body area network is a wireless network in which wearable sensors are implemented in or on patients' bodies to...

    Saba Marandi, Farokhlagha Moazami, Amir Malekinezhad in Peer-to-Peer Networking and Applications
    Article 23 May 2024
  20. Application of Mathematical Logic in Modern Design

    Rationality and sensibility have been complementing and restricting each other in the process of design. Mathematicians have used mathematics for...
    Jie Tang, **ng Ji in Cross-Cultural Design
    Conference paper 2023
Did you find what you were looking for? Share feedback.