Search
Search Results
-
Formal Verification of 5GAKA-LCCO Protocol Supporting Forward Secrecy: Through Expanded BAN Logic
As 5G technology becomes more advanced and innovative, various vulnerabilities are being discovered. As technology develops further, not only in 5G... -
Quantitative BAN Logic Based on Belief Degree
Authentication protocols are the basis for secure communication in many distributed systems but are highly prone to errors in their design,... -
BAN-Storm: a Bandwidth-Aware Scheduling Mechanism for Stream Jobs
The essential component of the Big Data system is the processing frameworks and engines responsible for crunching the data. To cope with the growing...
-
ISDA-BAN: interoperability and security based data authentication scheme for body area network
The new and integrated technologies have changed the traditional systems and services with new and smart automation systems. Smart healthcare system...
-
To BAN or Not to BAN: Bayesian Attention Networks for Reliable Hate Speech Detection
Hate speech is an important problem in the management of user-generated content. To remove offensive content or ban misbehaving users, content...
-
Networking and cryptography library with a non-repudiation flavor for blockchain
Blockchain is currently one of the most widely discussed inventions in the information and communication technology industry. It is a pillar of the...
-
An authentication mechanism based on blockchain for IoT environment
The Internet of Things (IoT) is a network where physical objects with unique addresses can connect and communicate with each other through the...
-
Secure privacy-enhanced fast authentication and key management for IoMT-enabled smart healthcare systems
The smart healthcare system advancements have introduced the Internet of Things, enabling technologies to improve the quality of medical services....
-
Proxy signature-based role delegation scheme: formal analysis and simulation
In the security domain, wide variety of signature schemes are available for providing confidentiality, Integrity and non-repudiation. Proxy signature...
-
A signcryption with identity-based authentication for secure EHR sharing in IoMT utilizing ECC
Due to real-time data sharing in the Internet of Medical Things (IoMT), the healthcare sector has evolved significantly in recent years. However,...
-
Provable secure authentication key agreement for wireless body area networks
Wireless body area networks (WBANs) guarantee timely data processing and secure information preservation within the range of the wireless access...
-
Quadratic residue-based unilateral authentication protocol for RFID system
Nowadays, Radio frequency identification (RFID) plays an important role in many real-life applications for remotely identifying objects. RFID system...
-
A Lightweight Authentication Protocol for a Blockchain-Based Off-Chain Medical Data Access in Multi-server Environment
Presently, blockchain technology is used to secure electronic medical records (EMR) and an arrangement of multiple servers as off-chain storage is...
-
A lightweight certificate-based authentication scheme for 6LoWPAN-based internet of things
As the 6LoWPAN devices in the Internet of Things (IoT) applications communicate sensitive information over the unattended and insecure channel, it is...
-
A provably lightweight mutually authentication and key establishment protocol using extended chaotic map for telecare medicine information system
Telecare Medicine Information System (TMIS) provides patient’s efficient and convenient e-healthcare services where the patient private health...
-
A hyperledger fabric-based EMR sharing mechanisms with proxy re-encryption and IPFS
With the advent of the information age, data storage has not only developed from paper information systems to electronic information system storage,...
-
PF-AKA: PUF-FSM based Authentication and Key Agreement Framework for IoT based Smart Grid Networks
Internet of Things (IoTs) is a promising technology that combines communication and data networking. Integration of Smart Grids (SGs) and IoT will...
-
A password less authentication protocol for multi-server environment using physical unclonable function
Password-based authentication is the most commonly used method to authenticate users to get online services. In password-based authentication, the...
-
An ECC-based mutual data access control protocol for next-generation public cloud
Through the broad usage of cloud computing and the extensive utilization of next-generation public clouds, people can share valuable information...
-
A secure lightweight mutual authentication scheme in Social Industrial IoT environment
The Social Industrial Internet of Things (SIIoT) is a new paradigm that integrates social networking features into the Industrial IoT (IIoT)...