![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessMachine learning for trust, security, and privacy in computing and communications
-
Chapter and Conference Paper
An Early Detection of Distributed Denial of Service Attack
attacks are arduous to detect because they can generate the attack traffic to flood the victim host from a large number of zombie machines. In this paper, we have designed and implemented an early attack de...
-
Article
A Lightweight Mutual Authentication with Wearable Device in Location-Based Mobile Edge Computing
In recent years, the proportion of elderly population in various countries has gradually increased. Increasing with age, it can entail illness. When these diseases are sudden, the elderly often die because the...
-
Chapter and Conference Paper
A Survey of Authentication Protocols in Logistics System
E-commerce has developed rapidly in recent years. Many services and applications integrate IOT technologies are offered. Logistics is a representative application which focuses on rapid delivery, integrity of ...
-
Chapter and Conference Paper
An ECC Based Secure and Convenient Rural Medical Care System
As hardware and software technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come to form the Internet of Things. At the sa...
-
Chapter and Conference Paper
Development of Audio and Visual Attention Assessment System in Combination with Brain Wave Instrument: Apply to Children with Attention Deficit Hyperactivity Disorder
The main purpose of this study mainly for children with attention deficit hyperactivity disorder (ADHD) to attention test, combined the development of the Visual and Audio Attention Test System (VAAT). We use ...
-
Article
A Secure Ambulance Communication Protocol for VANET
Vehicular ad hoc networks (VANETs) have been a research focus in recent years. VANET’s main applications are enhancing road safety and reducing traffic accidents. Moreover, the VANET system can also reduce the...
-
Article
Extension of an Efficient 3GPP Authentication and Key Agreement Protocol
Recently, Zhang and Fang proposed a security analysis and enhancements of 3GPP authentication and key agreement protocol (AP-AKA for short). The enhancements of 3GPP authentication and key agreement protocol i...
-
Article
An Ownership Transfer Scheme Using Mobile RFIDs
RFID reader equipment is widely used in hand-held devices; thus, the security of the connection between mobile readers and RFID servers is an important issue. In this paper, we propose a novel scheme with low ...
-
Article
A Non-repudiated Self-service Store System Based on Portable Trusted Device
Advances in wireless network technology and the continuously increasing users of Personal Trusted Device (PTD) make the latter an ideal channel for offering personalized services to mobile users. However, the ...
-
Article
Open AccessDynamic Session-Key Generation for Wireless Sensor Networks
Recently, wireless sensor networks have been used extensively in different domains. For example, if the wireless sensor node of a wireless sensor network is distributed in an insecure area, a secret key must b...
-
Article
A Mobile Ticket System Based on Personal Trusted Device
Advances in wireless network technology and the continuously increasing users of Personal Trusted Device (PTD) make the latter an ideal channel for offering personalized services to mobile users. In this paper...