We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 41-60 of 1,012 results
  1. The Turing Test is a Thought Experiment

    The Turing test has been studied and run as a controlled experiment and found to be underspecified and poorly designed. On the other hand, it has...

    Bernardo Gonçalves in Minds and Machines
    Article Open access 27 November 2022
  2. Lightweight group authentication protocol for secure RFID system

    Nowadays, wireless technology has been widely used in healthcare and communication systems. It makes our life easier in all respects. A...

    Sanjeev Kumar, Haider Banka, Baijnath Kaushik in Multimedia Tools and Applications
    Article 01 April 2024
  3. A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs)

    The dynamic connectivity and functionality of sensors has revolutionized remote monitoring applications thanks to the combination of IoT and wireless...

    Osama Bassam J. Rabie, Shitharth Selvarajan, ... Mueen Uddin in International Journal of Information Security
    Article Open access 20 November 2023
  4. A new lightweight conditional privacy preserving authentication and key – agreement protocol in social internet of things for vehicle to smart grid networks

    Smart grid systems play a vital role in resource management and distributions within a given supply chain. Vehicle-to-grid (V2G) technology is a...

    L Agilandeeswari, Swapnil Paliwal, ... M Prabukumar in Multimedia Tools and Applications
    Article 28 March 2022
  5. A provable secure and lightweight ECC-based authenticated key agreement scheme for edge computing infrastructure in smart grid

    With the gradual maturity of Smart Grid (SG), security challenges become the most important issues that need to be addressed urgently. In recent...

    Cong Wang, Peng Huo, ... Yiying Zhang in Computing
    Article Open access 27 June 2023
  6. BACP-IeFC: designing blockchain-based access control protocol in IoT-enabled fog computing environment

    The increasing number of edge layer devices connected to fog servers in fog computing environments has led to a rise in vulnerable and unauthorized...

    Akhil Chaurasia, Alok Kumar, Udai Pratap Rao in Cluster Computing
    Article 06 July 2024
  7. Provable secure authentication key agreement for wireless body area networks

    Wireless body area networks (WBANs) guarantee timely data processing and secure information preservation within the range of the wireless access...

    Yuqian Ma, Wenbo Shi, ... Qingfeng Cheng in Frontiers of Computer Science
    Article 23 December 2023
  8. Lattice-Based Multi-entity Identification Protocols

    It is crucial for IoT networks to produce new methods to efficiently handle communications among multiple IoT devices. Aggregate MAC/signatures...
    Yohei Watanabe, Toi Tomita, Junji Shikata in Mobile Internet Security
    Conference paper 2024
  9. BSAS: blockchain-based shareable authentication scheme for smart healthcare

    Nowadays, research efforts are strongly directed toward integrating Blockchain into Smart Healthcare Systems to achieve distribution, transparency,...

    Divya Rani, Sachin Tripathi, Ashish Tomar in Cluster Computing
    Article 04 April 2024
  10. An Efficient and Secure Mechanism for Ubiquitous Sustainable Computing System

    Internet of Things (IoT) devices are frequently utilized to collect information around humans’ daily routine, producing a need for them to regularly...
    Conference paper 2024
  11. RKMIS: robust key management protocol for industrial sensor network system

    The Internet of Things is a well-known and emerging technology that allows authorised users to monitor and access sensors deployed in various...

    Samiulla Itoo, Musheer Ahmad, ... Ahmed Alkhayyat in The Journal of Supercomputing
    Article 21 January 2023
  12. The role of artificial intelligence and machine learning in wireless networks security: principle, practice and challenges

    Security is one of the biggest challenges concerning networks and communications. The problem becomes aggravated with the proliferation of wireless...

    Muhammad Waqas, Shanshan Tu, ... Ziaul Haq Abbas in Artificial Intelligence Review
    Article 04 February 2022
  13. A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography

    Telecare Medicine Information System (TMIS) refers to a medical model that uses communication and information technology to realize multiple medical...

    Yulei Chen, Jianhua Chen in Multimedia Tools and Applications
    Article 12 October 2022
  14. Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review

    Internet of Things (IoT) as an emerging technology is based on the idea that smart things can connect to the Internet and exchange the collected data...

    Elham Ebrahimpour, Shahram Babaie in International Journal of Information Security
    Article 12 January 2024
  15. A blockchain-based provably secure anonymous authentication for edge computing-enabled IoT

    Edge computing server deployed at the edge of the network has promoted the development of the Internet of Things (IoT) but also brings some security...

    Shiqiang Zhang, Dongzhi Cao in The Journal of Supercomputing
    Article 30 October 2023
  16. Conceptualizations of user autonomy within the normative evaluation of dark patterns

    Dark patterns have received significant attention in literature as interface design practices which undermine users’ autonomy by coercing, misleading...

    Sanju Ahuja, Jyoti Kumar in Ethics and Information Technology
    Article 05 December 2022
  17. An Efficient Authentication and Key Agreement Scheme for CAV Internal Applications

    The data of applications in connected and autonomous vehicles are important, which is usually collected by service providers to improve their...
    Yang Li, Qingyang Zhang, ... Hong Zhong in Collaborative Computing: Networking, Applications and Worksharing
    Conference paper 2024
  18. PROTECT – An Easy Configurable Serious Game to Train Employees Against Social Engineering Attacks

    Social engineering is the clever manipulation of human trust. While most security protection focuses on technical aspects, organisations remain...
    Ludger Goeke, Alejandro Quintanar, ... Sebastian Pape in Computer Security
    Conference paper 2020
  19. Bigdata-Facilitated Two-Party Authenticated Key Exchange for IoT

    Authenticated Key Exchange (AKE) protocols, by definition, guarantee both session key secrecy and entity authentication. Informally, session key...
    Bowen Liu, Qiang Tang, Jianying Zhou in Information Security
    Conference paper 2021
  20. Anonymous and Practical Multi-factor Authentication for Mobile Devices Using Two-Server Architecture

    At present, password authentication technology using single-server architecture has been widely used in practice. However, it cannot resist internal...
    Conference paper 2023
Did you find what you were looking for? Share feedback.