We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Formal Verification of 5GAKA-LCCO Protocol Supporting Forward Secrecy: Through Expanded BAN Logic

    As 5G technology becomes more advanced and innovative, various vulnerabilities are being discovered. As technology develops further, not only in 5G...
    Gunwoo Kim, Yongho Ko, Ilsun You in Mobile Internet Security
    Conference paper 2024
  2. Quantitative BAN Logic Based on Belief Degree

    Authentication protocols are the basis for secure communication in many distributed systems but are highly prone to errors in their design,...
    Kaixuan Li, Hengyang Wu, ... Yixiang Chen in Artificial Intelligence Logic and Applications
    Conference paper 2022
  3. Beyond bipartisan support: analyzing the TikTok ban votes in the U.S. house of representatives

    The U.S. House of Representatives made a significant move by passing legislation on the TikTok ban ‘twice’ in less than 40 days. The passed...

    Wisanupong Potipiroon in Global Public Policy and Governance
    Article 08 July 2024
  4. Trump’s Travel Ban

    This chapter examines the three iterations of Trump’s travel ban issued between January and September 2017. As President, Trump moved immediately to...
    Chapter 2022
  5. Why and when democracies ban political parties: a classification of democratic state orientations to party bans

    Defending democracy requires undemocratic steps; one of the most radical is the prohibition of political parties. The functioning of political...

    Bohdan Bernatskyi in Comparative European Politics
    Article Open access 29 April 2024
  6. A Security Analysis Approach for Secure Color-Code Key Exchange Protocol by Using BAN Logic

    In, 2016, the first secure color-code key exchange (SCCKE) protocol for secure mobile chat applications (MC APPs) was proposed by Hsing-Chung Chen....
    Hsing-Chung Chen, Mosiur Rahaman, Cahya Damarjati in Innovative Mobile and Internet Services in Ubiquitous Computing
    Conference paper 2021
  7. Design and FPGA Synthesis of BAN Processing Unit for Non-Archimedean Number Crunching

    This work presents the design and synthesis of a processing unit for numbers encoded according to the recently introduced BAN format. Such an...
    Federico Rossi, Lorenzo Fiaschi, ... Sergio Saponara in Applications in Electronics Pervading Industry, Environment and Society
    Conference paper 2023
  8. Implementation of iterative error detection and correction for BAN transceiver systems

    The rapid development of wireless communication technology has facilitated internal and external applications for the human body, leading to the...

    Kuang-Hao Lin, Fu-Chi Chen in Wireless Networks
    Article 05 January 2023
  9. Spatial Negotiations: State Space and Lived Space of the Thai Ban

    The first section of this chapter examines the official mode of border-crossing that occur through the checkpoint at Chong MekChong Mek-Phonthong...
    Thanachate Wisaijorn in Riverine Border Practices
    Chapter 2022
  10. Free Choice in Modal Inquisitive Logic

    This paper investigates inquisitive extensions of normal modal logic with an existential modal operator taken as primitive. The semantics of the...

    Article Open access 24 August 2022
  11. Security Analysis of the Access Control Solution of NDN Using BAN Logic

    Named Data Networking (NDN) is a new promising architecture of information-centric networking. Traditional mechanisms of access control can no longer...

    Yuan Fei, Huibiao Zhu, Phan Cong Vinh in Mobile Networks and Applications
    Article 18 January 2020
  12. BAN-Storm: a Bandwidth-Aware Scheduling Mechanism for Stream Jobs

    The essential component of the Big Data system is the processing frameworks and engines responsible for crunching the data. To cope with the growing...

    Asif Muhammad, Muhammad Aleem in Journal of Grid Computing
    Article 20 June 2021
  13. ISDA-BAN: interoperability and security based data authentication scheme for body area network

    The new and integrated technologies have changed the traditional systems and services with new and smart automation systems. Smart healthcare system...

    Faisal Kiyani, Kashif Naseer Qureshi, ... Gwanggil Jeon in Cluster Computing
    Article 16 December 2022
  14. Should Democracies Ban Hate Speech? Hate Speech Laws and Counterspeech

    The paper’s main goal is to compare laws banning hate speech with counterspeech as an effective method of curtailing hate speech. In the first part,...

    Article 24 November 2022
  15. The Image and Its Ban—A Contradictory Twosome at the Heart of All Symbolic Orders

    By confronting two mutually exclusive approaches towards the ban on images, the following article explores the ways in which these bans inform the...
    Chapter 2023
  16. The Muslim Ban: The Racialization of Religion and Soteriological Privilege

    Why do some racial and religious groups appear to be inseparably associated, what are the consequences of these associations, and how might new...
    Mara Brecht in Dissenting Church
    Chapter Open access 2024
  17. To BAN or Not to BAN: Bayesian Attention Networks for Reliable Hate Speech Detection

    Hate speech is an important problem in the management of user-generated content. To remove offensive content or ban misbehaving users, content...

    Kristian Miok, Blaž Škrlj, ... Marko Robnik-Šikonja in Cognitive Computation
    Article Open access 26 January 2021
  18. Security Analysis Based on BAN Logic

    ManyBAN logic quantum authentication schemes have been designed according to quantum key distributionQuantum Key Distribution (QKD). Scheme security...
    Tao Shang, Jianwei Liu in Secure Quantum Network Coding Theory
    Chapter 2020
  19. Modelling policy scenarios: refocussing the model-policy logic for the case of German passenger transport

    Background

    National energy and climate scenarios are typically simulated or optimised using sectoral or energy system models, which include a large...

    Article Open access 20 June 2024
Did you find what you were looking for? Share feedback.