Search
Search Results
-
A novel two-level secure access control approach for blockchain platform in healthcare
The advent of blockchain technology has ushered a paradigm shift in storage of healthcare data from conventional to online mode. As public ledgers,...
-
A Tale of Two Automotive Security Services: A Formal Analysis
Automotive system faced in the past decade an abundance of security services proposed by the scientific literature to strengthen their system... -
Time dependency: an efficient biometric-based authentication for secure communication in wireless healthcare sensor networks
Healthcare systems promise a significant impact in the field of quality of life. However, security is one of the hottest topics that must be...
-
Khat-Chewing, Adiaphorisation and Morality: Rethinking Ethics in the Age of the Synopticon
In June 2014, the UK Government made khat ( Catha edulis ) a Class C drug under the UK Misuse of Drugs Act. Based on limited evidence, this decision...
-
Planning without Banning: Animal Research and the Argument from Avoidable Harms
The call for a planned phase-out is at the forefront of the political debate about animal experimentation. While authorities like the European...
-
The Place and Value of Logic in Louis Couturat’s Philosophical Thinking
Louis Couturat is known for affirming and defending the works of logic available during his lifetime, especially those of Russell and the Italian... -
A Formally Validated Authentication Algorithm for Secure Message Forwarding in Smart Home Networks
The many devices connected in smart homes increase the attack surfaces from which adversaries can invade the network. In addition, majority of these...
-
4F-MAKA: Four-factor mutual authentication and key agreement protocol for internet of things
The Internet of Things (IoT), a popular technology that has revolutionized the concept of smart gadgets by bringing the world together, uses the...
-
A novel and quantum-resistant handover authentication protocol in IoT environment
Handover authentication and key agreement protocol is extremely essential to ensure the security of the Internet of Things (IoT), and it enables...
-
An enhanced smart card and dynamic ID based remote multi-server user authentication scheme
Organizations often use smart card-based user authentication for remote access. The research community has put forward dynamic identity based remote...
-
ISAKA: Improved Secure Authentication and Key Agreement protocol for WBAN
Internet of Things (IoT) is a revolution which has influenced the lifestyle of human. Wireless Body Area Networks (WBAN)s are IoT-based applications...
-
A secure IoT-based micro-payment protocol for wearable devices
Wearable devices are parts of the essential cost of goods sold (COGS) in the wheel of the Internet of things (IoT), contributing to a potential...
-
Oskar Becker: On the Logic of Modalities
The following short essay contains a first attempt to confront with the currently emerging problem of the logic of modalities on the basis of a... -
EDPPA: An efficient distance-based privacy preserving authentication protocol in VANET
With the ever-growing development of the Internet of Things (IoTs), the Vehicular ad-hoc Network (VANET) is widely utilized in terms of vehicle...
-
Paradoxes of the Right-Wing Sexual/Gender Politics in Hungary: Right-Wing Populism and the Ban of Gender Studies
In this chapter, I study gender and sexual politics in right-wing populism applied in Hungarian state propaganda during the 2010s with a focus on the... -
\(\chi\)perbp: a cloud-based lightweight mutual authentication protocol
Cloud-based RFID is gaining popularity in tandem with the growth of cloud computing and the Internet of Things (IoT). The cloud-based RFID system is...
-
A novel protocol for efficient authentication in cloud-based IoT devices
The Internet of Things (IoT) has emerged as one of the most revolutionary technological innovations with the proliferation of applications within...
-
Secure and Negotiate Scheme for Vehicle-to-Vehicle Communications in an IoV
The exchange of real-time data between vehicle-to-vehicle communications is crucial in the Internet of Vehicles (IoV) for vehicle-intelligent... -
Introduction
Donald J. Trump was elected President of the United States in November 2016 on a platform of ‘making America great again’. One of the key themes of... -
PUF-Based Lightweight Authentication Protocol for IoT Devices
The Internet of Things (IoTs) carries the secure transmission and storage of a large amount of sensitive information. This paper uses the...