![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Quantified emotion analysis based on design principles of color feature recognition in pictures
When people observe pictures, different pictures will generate different emotions, and the painters often convey emotional energy to the audience through the media. Through the effect of this emotional transfe...
-
Article
A hyperledger fabric-based EMR sharing mechanisms with proxy re-encryption and IPFS
With the advent of the information age, data storage has not only developed from paper information systems to electronic information system storage, but has also extended to cloud database storage methods. To ...
-
Article
An IoT and blockchain based logistics application of UAV
With the increasing number of online consumers, the relationship between the Internet of things and the Internet is becoming closer. Logistics transportation plays an important role in the whole online shoppin...
-
Article
A Lightweight Mutual Authentication with Wearable Device in Location-Based Mobile Edge Computing
In recent years, the proportion of elderly population in various countries has gradually increased. Increasing with age, it can entail illness. When these diseases are sudden, the elderly often die because the...
-
Chapter and Conference Paper
Enhanced WPA2/PSK for Preventing Authentication Cracking
With the popularization of mobile phones and Wi-Fi hotspots, the diversification of wireless communication applications has rapidly growing. Wi-Fi Protected Access (WPA), offered by network user authentication...
-
Chapter and Conference Paper
A Secure Authentication Protocol for Wireless Sensor Network in Smart Vehicular System
As wireless sensor networks (WSN) and Internet of things (IoT) have rapidly developed over recent years, the smart vehicular system is designed in the environment of WSN to provide vehicle related applications...
-
Chapter and Conference Paper
Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme Using Elliptic Curve Cryptosystems
Nowadays users can access various online services and resources from distributed information systems remotely via Internet or other public networks. However, remote online systems are vulnerable to many securi...
-
Chapter and Conference Paper
Design of a Secure Emergency Communication System Based on Cloud for Pregnancy
Due to the high maternal mortality, it is particularly necessary to attend pregnant woman by emergency communication system as timely treatment to avoid maternal deaths. In this paper, we propose an emergency ...
-
Article
A Secure Ambulance Communication Protocol for VANET
Vehicular ad hoc networks (VANETs) have been a research focus in recent years. VANET’s main applications are enhancing road safety and reducing traffic accidents. Moreover, the VANET system can also reduce the...
-
Article
A secure ownership transfer protocol using EPCglobal Gen-2 RFID
Radio Frequency Identification (RFID) is a relatively new technology. In recent years, it has been shown to be convenient and feasible in many applications. However, there are security issues which need to be ...
-
Article
Extension of an Efficient 3GPP Authentication and Key Agreement Protocol
Recently, Zhang and Fang proposed a security analysis and enhancements of 3GPP authentication and key agreement protocol (AP-AKA for short). The enhancements of 3GPP authentication and key agreement protocol i...
-
Article
An Ownership Transfer Scheme Using Mobile RFIDs
RFID reader equipment is widely used in hand-held devices; thus, the security of the connection between mobile readers and RFID servers is an important issue. In this paper, we propose a novel scheme with low ...
-
Chapter and Conference Paper
An IPv6 Multihomed Host for Outbound Traffic
Though the technology of IPv6 network has become mature in recent years, it still takes long to dispose IPv6 in an all-round way in the internet. In this research, we have designed an IPv6 multihomed host arch...
-
Chapter and Conference Paper
Enabling Two Levels of Adaptation: A Framework for Traffic-Aware and Context Management Deployment
This paper presents a novel approach in that it provides both inter-service adaptation by reconfiguring current available services in reaction to environment changes and intra-service adaptation by selecting t...
-
Article
A Non-repudiated Self-service Store System Based on Portable Trusted Device
Advances in wireless network technology and the continuously increasing users of Personal Trusted Device (PTD) make the latter an ideal channel for offering personalized services to mobile users. However, the ...
-
Article
A Mobile Ticket System Based on Personal Trusted Device
Advances in wireless network technology and the continuously increasing users of Personal Trusted Device (PTD) make the latter an ideal channel for offering personalized services to mobile users. In this paper...
-
Chapter and Conference Paper
A Secure Authentication Scheme for a Public Terminal Before a Transaction
Due to the fast progress of the Internet, and with the increasing numbers of public terminals spread everywhere, people can access personal sensitive data or perform transactions easily through these public te...