Search
Search Results
-
Formal Verification of 5GAKA-LCCO Protocol Supporting Forward Secrecy: Through Expanded BAN Logic
As 5G technology becomes more advanced and innovative, various vulnerabilities are being discovered. As technology develops further, not only in 5G... -
Quantitative BAN Logic Based on Belief Degree
Authentication protocols are the basis for secure communication in many distributed systems but are highly prone to errors in their design,... -
Beyond bipartisan support: analyzing the TikTok ban votes in the U.S. house of representatives
The U.S. House of Representatives made a significant move by passing legislation on the TikTok ban ‘twice’ in less than 40 days. The passed...
-
Trump’s Travel Ban
This chapter examines the three iterations of Trump’s travel ban issued between January and September 2017. As President, Trump moved immediately to... -
Why and when democracies ban political parties: a classification of democratic state orientations to party bans
Defending democracy requires undemocratic steps; one of the most radical is the prohibition of political parties. The functioning of political...
-
A Security Analysis Approach for Secure Color-Code Key Exchange Protocol by Using BAN Logic
In, 2016, the first secure color-code key exchange (SCCKE) protocol for secure mobile chat applications (MC APPs) was proposed by Hsing-Chung Chen.... -
Design and FPGA Synthesis of BAN Processing Unit for Non-Archimedean Number Crunching
This work presents the design and synthesis of a processing unit for numbers encoded according to the recently introduced BAN format. Such an... -
-
Implementation of iterative error detection and correction for BAN transceiver systems
The rapid development of wireless communication technology has facilitated internal and external applications for the human body, leading to the...
-
Spatial Negotiations: State Space and Lived Space of the Thai Ban
The first section of this chapter examines the official mode of border-crossing that occur through the checkpoint at Chong MekChong Mek-Phonthong... -
Free Choice in Modal Inquisitive Logic
This paper investigates inquisitive extensions of normal modal logic with an existential modal operator taken as primitive. The semantics of the...
-
Security Analysis of the Access Control Solution of NDN Using BAN Logic
Named Data Networking (NDN) is a new promising architecture of information-centric networking. Traditional mechanisms of access control can no longer...
-
BAN-Storm: a Bandwidth-Aware Scheduling Mechanism for Stream Jobs
The essential component of the Big Data system is the processing frameworks and engines responsible for crunching the data. To cope with the growing...
-
ISDA-BAN: interoperability and security based data authentication scheme for body area network
The new and integrated technologies have changed the traditional systems and services with new and smart automation systems. Smart healthcare system...
-
Should Democracies Ban Hate Speech? Hate Speech Laws and Counterspeech
The paper’s main goal is to compare laws banning hate speech with counterspeech as an effective method of curtailing hate speech. In the first part,...
-
The Image and Its Ban—A Contradictory Twosome at the Heart of All Symbolic Orders
By confronting two mutually exclusive approaches towards the ban on images, the following article explores the ways in which these bans inform the... -
The Muslim Ban: The Racialization of Religion and Soteriological Privilege
Why do some racial and religious groups appear to be inseparably associated, what are the consequences of these associations, and how might new... -
To BAN or Not to BAN: Bayesian Attention Networks for Reliable Hate Speech Detection
Hate speech is an important problem in the management of user-generated content. To remove offensive content or ban misbehaving users, content...
-
Security Analysis Based on BAN Logic
ManyBAN logic quantum authentication schemes have been designed according to quantum key distributionQuantum Key Distribution (QKD). Scheme security... -
Modelling policy scenarios: refocussing the model-policy logic for the case of German passenger transport
BackgroundNational energy and climate scenarios are typically simulated or optimised using sectoral or energy system models, which include a large...