We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 81-100 of 10,000 results
  1. A novel two-level secure access control approach for blockchain platform in healthcare

    The advent of blockchain technology has ushered a paradigm shift in storage of healthcare data from conventional to online mode. As public ledgers,...

    Shweta Mittal, Mohona Ghosh in International Journal of Information Security
    Article 10 February 2023
  2. A Tale of Two Automotive Security Services: A Formal Analysis

    Automotive system faced in the past decade an abundance of security services proposed by the scientific literature to strengthen their system...
    Conference paper 2024
  3. Time dependency: an efficient biometric-based authentication for secure communication in wireless healthcare sensor networks

    Healthcare systems promise a significant impact in the field of quality of life. However, security is one of the hottest topics that must be...

    Meysam Ghahramani, Reza Javidan in Journal of Computer Virology and Hacking Techniques
    Article 09 September 2022
  4. Khat-Chewing, Adiaphorisation and Morality: Rethinking Ethics in the Age of the Synopticon

    In June 2014, the UK Government made khat ( Catha edulis ) a Class C drug under the UK Misuse of Drugs Act. Based on limited evidence, this decision...

    Spencer Swain, Brett Lashua, Karl Spracklen in Critical Criminology
    Article Open access 20 April 2024
  5. Planning without Banning: Animal Research and the Argument from Avoidable Harms

    The call for a planned phase-out is at the forefront of the political debate about animal experimentation. While authorities like the European...

    Nico Dario Müller in Ethical Theory and Moral Practice
    Article Open access 01 July 2024
  6. The Place and Value of Logic in Louis Couturat’s Philosophical Thinking

    Louis Couturat is known for affirming and defending the works of logic available during his lifetime, especially those of Russell and the Italian...
    Anne-Françoise Schmid in Logic in Question
    Chapter 2022
  7. A Formally Validated Authentication Algorithm for Secure Message Forwarding in Smart Home Networks

    The many devices connected in smart homes increase the attack surfaces from which adversaries can invade the network. In addition, majority of these...

    Vincent Omollo Nyangaresi in SN Computer Science
    Article 09 July 2022
  8. 4F-MAKA: Four-factor mutual authentication and key agreement protocol for internet of things

    The Internet of Things (IoT), a popular technology that has revolutionized the concept of smart gadgets by bringing the world together, uses the...

    Diksha Rangwani, Hari Om in Peer-to-Peer Networking and Applications
    Article 20 September 2022
  9. A novel and quantum-resistant handover authentication protocol in IoT environment

    Handover authentication and key agreement protocol is extremely essential to ensure the security of the Internet of Things (IoT), and it enables...

    Shuailiang Zhang, **ujuan Du, **n Liu in Wireless Networks
    Article 10 May 2023
  10. An enhanced smart card and dynamic ID based remote multi-server user authentication scheme

    Organizations often use smart card-based user authentication for remote access. The research community has put forward dynamic identity based remote...

    Nitish Andola, Sourabh Prakash, ... Shekhar Verma in Cluster Computing
    Article 11 May 2022
  11. ISAKA: Improved Secure Authentication and Key Agreement protocol for WBAN

    Internet of Things (IoT) is a revolution which has influenced the lifestyle of human. Wireless Body Area Networks (WBAN)s are IoT-based applications...

    Javad Alizadeh, Masoumeh Safkhani, Amir Allahdadi in Wireless Personal Communications
    Article 26 June 2022
  12. A secure IoT-based micro-payment protocol for wearable devices

    Wearable devices are parts of the essential cost of goods sold (COGS) in the wheel of the Internet of things (IoT), contributing to a potential...

    Sriramulu Bojjagani, P. V. Venkateswara Rao, ... T. Jaya Lakshmi in Peer-to-Peer Networking and Applications
    Article 17 January 2022
  13. Oskar Becker: On the Logic of Modalities

    The following short essay contains a first attempt to confront with the currently emerging problem of the logic of modalities on the basis of a...
    Chapter 2022
  14. EDPPA: An efficient distance-based privacy preserving authentication protocol in VANET

    With the ever-growing development of the Internet of Things (IoTs), the Vehicular ad-hoc Network (VANET) is widely utilized in terms of vehicle...

    ** Ren, Yuyang Cheng, Shiyuan Xu in Peer-to-Peer Networking and Applications
    Article 03 March 2022
  15. Paradoxes of the Right-Wing Sexual/Gender Politics in Hungary: Right-Wing Populism and the Ban of Gender Studies

    In this chapter, I study gender and sexual politics in right-wing populism applied in Hungarian state propaganda during the 2010s with a focus on the...
    Chapter 2022
  16. \(\chi\)perbp: a cloud-based lightweight mutual authentication protocol

    Cloud-based RFID is gaining popularity in tandem with the growth of cloud computing and the Internet of Things (IoT). The cloud-based RFID system is...

    Morteza Adeli, Nasour Bagheri, ... Saru Kumari in Peer-to-Peer Networking and Applications
    Article 27 May 2023
  17. A novel protocol for efficient authentication in cloud-based IoT devices

    The Internet of Things (IoT) has emerged as one of the most revolutionary technological innovations with the proliferation of applications within...

    Irfan Alam, Manoj Kumar in Multimedia Tools and Applications
    Article 24 February 2022
  18. Secure and Negotiate Scheme for Vehicle-to-Vehicle Communications in an IoV

    The exchange of real-time data between vehicle-to-vehicle communications is crucial in the Internet of Vehicles (IoV) for vehicle-intelligent...
    **quan Hou, Yuqiu Jian, ... Guoai Xu in Intelligent Information Processing XII
    Conference paper 2024
  19. Introduction

    Donald J. Trump was elected President of the United States in November 2016 on a platform of ‘making America great again’. One of the key themes of...
    Chapter 2022
  20. PUF-Based Lightweight Authentication Protocol for IoT Devices

    The Internet of Things (IoTs) carries the secure transmission and storage of a large amount of sensitive information. This paper uses the...
    Amita Shah, Hetal Pandya, ... Ismail Keshta in Intelligent Computing and Networking
    Conference paper 2023
Did you find what you were looking for? Share feedback.