We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 660 results
  1. A mutual authentication scheme in VANET providing vehicular anonymity and tracking

    Nowadays, the intelligent transportation system (ITS) has developed prosperously all over the world. As a key technique in ITS, vehicular ad-hoc...

    Jiabei He, Xuchong Liu, ... **ong Li in Telecommunication Systems
    Article 26 July 2022
  2. MAPMCECCM: a mutual authentication protocol for mobile cloud environment using Chebyshev Chaotic Map

    Cloud services are expanding tremendously in mobile environment with the advent of wireless technology. However, privacy in accessing the cloud...

    Manojkumar Vivekanandan, V. N. Sastry, U. Srinivasulu Reddy in Telecommunication Systems
    Article 31 August 2021
  3. Privacy-Preserving Mutual Authentication and Key Agreement Scheme for Multi-Server Healthcare System

    The usage of different technologies and smart devices helps people to get medical services remotely for multiple benefits. Thus, critical and...

    Trupil Limbasiya, Sanjay Kumar Sahay, Bharath Sridharan in Information Systems Frontiers
    Article 18 March 2021
  4. Innovative supply chain network design with two-step authentication and environmentally-friendly blockchain technology

    Blockchain Technology (BT) has the potential to revolutionize supply chain management by providing transparency, but it also poses significant...

    Ardavan Babaei, Erfan Babaee Tirkolaee, Sadia Samar Ali in Annals of Operations Research
    Article Open access 25 April 2024
  5. An efficient blockchain assisted dynamic authentication scheme for geo-spatial enabled vehicular network

    The primary goal of vehicular networks is to increase vehicle safety as well as transportation efficiency with the application of wireless...

    Anjali Goswami, Saurabh Rana, Deepak Chhikara in Telecommunication Systems
    Article 14 May 2023
  6. Highly secure authentication and key agreement protocol for the internet of vehicles

    In the contemporary era, the Internet of Vehicles (IoV) plays a pivotal role in traffic management, especially in the context of highly scalable and...

    Li Li, **ngJuan Fan, ... Seyyed Amirreza Dabollahi in Telecommunication Systems
    Article 18 June 2024
  7. A new authentication and key agreement protocol for 5G wireless networks

    Authentication and key agreement (AKA) protocol is an important security mechanism for access services in mobile communication systems. The 3GPP...

    Tian Liu, Fan Wu, ... Chaoyang Chen in Telecommunication Systems
    Article 29 July 2021
  8. RAKS: robust authentication and key agreement scheme for satellite infrastructure

    One of the network communication systems in our surroundings that has a significant influence on our day-to-day lives is the satellite network. Many...

    Akber Ali Khan, Vinod Kumar, ... Mridul Kumar Gupta in Telecommunication Systems
    Article 07 July 2022
  9. The application of multi-server authentication scheme in internet banking transaction environments

    Information and communication technology has altered businesses’ operations, with a host of established and new banks launching online banking...

    Chien-Hua Tsai, Pin-Chang Su in Information Systems and e-Business Management
    Article 13 October 2020
  10. Message authentication algorithm for OFDM communication systems

    With the huge expansion in the telecommunications industry, the need for robust information security is becoming more critical than ever. Physical...

    Reem Melki, Hassan N. Noura, ... Ali Chehab in Telecommunication Systems
    Article 06 October 2020
  11. A secure n-secret based client authentication protocol for 802.11 WLANs

    Authentication has strong impact on the overall security model of every information system. Various authentication techniques are available for...

    Pawan Kumar, Dinesh Kumar in Telecommunication Systems
    Article 15 June 2020
  12. A secure and efficient key agreement framework for critical energy infrastructure using mobile device

    Internet of Energy (IoE) provides two-way communication for reform of energy utilization between service providers and consumers. To provide secure,...

    Akber Ali Khan, Vinod Kumar, ... Ahmed A. Abd El-Latif in Telecommunication Systems
    Article 14 September 2021
  13. Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues

    This paper presents a comprehensive investigation of authentication schemes for smart mobile devices. We start by providing an overview of existing...

    Mohamed Amine Ferrag, Leandros Maglaras, ... Helge Janicke in Telecommunication Systems
    Article 13 September 2019
  14. On Group Ownership Delegate Protocol for RFID Systems

    As RFID tags identify objects at the item level, proper authentication of these tags is of paramount importance in RFID-based systems. While RFID tag...

    Yu-Ju Tu, Gaurav Kapoor, Selwyn Piramuthu in Information Systems Frontiers
    Article 24 July 2021
  15. Attacks to mobile networks using SS7 vulnerabilities: a real traffic analysis

    Luiza Odete H. de Carvalho Macedo, Miguel Elias M. Campista in Telecommunication Systems
    Article 16 May 2023
  16. IHKM: an improved hierarchical key management scheme for wireless sensor network

    Wireless sensor networks (WSNs) are widely acknowledged for their potential as a robust infrastructure for collecting, processing, and transmitting...

    Khushboo Jain, Akansha Singh in Telecommunication Systems
    Article 23 June 2024
  17. Ethical Consumption and Self-authenticity in a Second-hand Luxury Fashion Industry Online Platform: A Conceptual Model of Interpretation

    In the ethical consumption literature, the process of buying and selling luxury second-hand products on the online peer-to-peer platforms has...
    Monica Faraoni, Silvia Ranfagni in Digital Transformation for Fashion and Luxury Brands
    Chapter 2024
  18. Enablers of blockchain adoption on supply chain with dynamic capability perspectives with ISM-MICMAC analysis

    Using emerging digital technology to improve supply chain management (SCM) and remain competitive is critical for a supply chain. This paper aims to...

    Shang-Ching Kuei, Mu-Chen Chen in Annals of Operations Research
    Article 16 November 2023
  19. Management of National eID Infrastructure as a State-Critical Asset and Public-private Partnership: Learning from the Case of Estonia

    In the management of national electronic identity (eID) infrastructure, cooperation between public and private parties becomes more and more...

    Silvia Lips, Valentyna Tsap, ... Dirk Draheim in Information Systems Frontiers
    Article Open access 16 January 2023
  20. Design issues in “a secure and efficient key agreement framework for critical energy infrastructure using mobile device”

    We show that the scheme (Telecommun Syst 78:539–557, 2021) is flawed. It uses a symmetric key encryption to transfer data between vehicles and the...

    Zhengjun Cao in Telecommunication Systems
    Article 15 March 2024
Did you find what you were looking for? Share feedback.