Search
Search Results
-
The Turing Test is a Thought Experiment
The Turing test has been studied and run as a controlled experiment and found to be underspecified and poorly designed. On the other hand, it has...
-
Lightweight group authentication protocol for secure RFID system
Nowadays, wireless technology has been widely used in healthcare and communication systems. It makes our life easier in all respects. A...
-
A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs)
The dynamic connectivity and functionality of sensors has revolutionized remote monitoring applications thanks to the combination of IoT and wireless...
-
A new lightweight conditional privacy preserving authentication and key – agreement protocol in social internet of things for vehicle to smart grid networks
Smart grid systems play a vital role in resource management and distributions within a given supply chain. Vehicle-to-grid (V2G) technology is a...
-
A provable secure and lightweight ECC-based authenticated key agreement scheme for edge computing infrastructure in smart grid
With the gradual maturity of Smart Grid (SG), security challenges become the most important issues that need to be addressed urgently. In recent...
-
BACP-IeFC: designing blockchain-based access control protocol in IoT-enabled fog computing environment
The increasing number of edge layer devices connected to fog servers in fog computing environments has led to a rise in vulnerable and unauthorized...
-
Provable secure authentication key agreement for wireless body area networks
Wireless body area networks (WBANs) guarantee timely data processing and secure information preservation within the range of the wireless access...
-
Lattice-Based Multi-entity Identification Protocols
It is crucial for IoT networks to produce new methods to efficiently handle communications among multiple IoT devices. Aggregate MAC/signatures... -
BSAS: blockchain-based shareable authentication scheme for smart healthcare
Nowadays, research efforts are strongly directed toward integrating Blockchain into Smart Healthcare Systems to achieve distribution, transparency,...
-
An Efficient and Secure Mechanism for Ubiquitous Sustainable Computing System
Internet of Things (IoT) devices are frequently utilized to collect information around humans’ daily routine, producing a need for them to regularly... -
RKMIS: robust key management protocol for industrial sensor network system
The Internet of Things is a well-known and emerging technology that allows authorised users to monitor and access sensors deployed in various...
-
The role of artificial intelligence and machine learning in wireless networks security: principle, practice and challenges
Security is one of the biggest challenges concerning networks and communications. The problem becomes aggravated with the proliferation of wireless...
-
A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography
Telecare Medicine Information System (TMIS) refers to a medical model that uses communication and information technology to realize multiple medical...
-
Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review
Internet of Things (IoT) as an emerging technology is based on the idea that smart things can connect to the Internet and exchange the collected data...
-
A blockchain-based provably secure anonymous authentication for edge computing-enabled IoT
Edge computing server deployed at the edge of the network has promoted the development of the Internet of Things (IoT) but also brings some security...
-
Conceptualizations of user autonomy within the normative evaluation of dark patterns
Dark patterns have received significant attention in literature as interface design practices which undermine users’ autonomy by coercing, misleading...
-
An Efficient Authentication and Key Agreement Scheme for CAV Internal Applications
The data of applications in connected and autonomous vehicles are important, which is usually collected by service providers to improve their... -
PROTECT – An Easy Configurable Serious Game to Train Employees Against Social Engineering Attacks
Social engineering is the clever manipulation of human trust. While most security protection focuses on technical aspects, organisations remain... -
Bigdata-Facilitated Two-Party Authenticated Key Exchange for IoT
Authenticated Key Exchange (AKE) protocols, by definition, guarantee both session key secrecy and entity authentication. Informally, session key... -
Anonymous and Practical Multi-factor Authentication for Mobile Devices Using Two-Server Architecture
At present, password authentication technology using single-server architecture has been widely used in practice. However, it cannot resist internal...