![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Enhanced WPA2/PSK for Preventing Authentication Cracking
With the popularization of mobile phones and Wi-Fi hotspots, the diversification of wireless communication applications has rapidly growing. Wi-Fi Protected Access (WPA), offered by network user authentication...
-
Chapter and Conference Paper
A Secure Authentication Protocol for Wireless Sensor Network in Smart Vehicular System
As wireless sensor networks (WSN) and Internet of things (IoT) have rapidly developed over recent years, the smart vehicular system is designed in the environment of WSN to provide vehicle related applications...
-
Chapter and Conference Paper
Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme Using Elliptic Curve Cryptosystems
Nowadays users can access various online services and resources from distributed information systems remotely via Internet or other public networks. However, remote online systems are vulnerable to many securi...
-
Chapter and Conference Paper
Design of a Secure Emergency Communication System Based on Cloud for Pregnancy
Due to the high maternal mortality, it is particularly necessary to attend pregnant woman by emergency communication system as timely treatment to avoid maternal deaths. In this paper, we propose an emergency ...
-
Article
A secure ownership transfer protocol using EPCglobal Gen-2 RFID
Radio Frequency Identification (RFID) is a relatively new technology. In recent years, it has been shown to be convenient and feasible in many applications. However, there are security issues which need to be ...
-
Chapter and Conference Paper
An IPv6 Multihomed Host for Outbound Traffic
Though the technology of IPv6 network has become mature in recent years, it still takes long to dispose IPv6 in an all-round way in the internet. In this research, we have designed an IPv6 multihomed host arch...
-
Chapter and Conference Paper
Enabling Two Levels of Adaptation: A Framework for Traffic-Aware and Context Management Deployment
This paper presents a novel approach in that it provides both inter-service adaptation by reconfiguring current available services in reaction to environment changes and intra-service adaptation by selecting t...