We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 1,983 results
  1. Formal Verification of 5GAKA-LCCO Protocol Supporting Forward Secrecy: Through Expanded BAN Logic

    As 5G technology becomes more advanced and innovative, various vulnerabilities are being discovered. As technology develops further, not only in 5G...
    Gunwoo Kim, Yongho Ko, Ilsun You in Mobile Internet Security
    Conference paper 2024
  2. Quantitative BAN Logic Based on Belief Degree

    Authentication protocols are the basis for secure communication in many distributed systems but are highly prone to errors in their design,...
    Kaixuan Li, Hengyang Wu, ... Yixiang Chen in Artificial Intelligence Logic and Applications
    Conference paper 2022
  3. BAN-Storm: a Bandwidth-Aware Scheduling Mechanism for Stream Jobs

    The essential component of the Big Data system is the processing frameworks and engines responsible for crunching the data. To cope with the growing...

    Asif Muhammad, Muhammad Aleem in Journal of Grid Computing
    Article 20 June 2021
  4. ISDA-BAN: interoperability and security based data authentication scheme for body area network

    The new and integrated technologies have changed the traditional systems and services with new and smart automation systems. Smart healthcare system...

    Faisal Kiyani, Kashif Naseer Qureshi, ... Gwanggil Jeon in Cluster Computing
    Article 16 December 2022
  5. To BAN or Not to BAN: Bayesian Attention Networks for Reliable Hate Speech Detection

    Hate speech is an important problem in the management of user-generated content. To remove offensive content or ban misbehaving users, content...

    Kristian Miok, Blaž Škrlj, ... Marko Robnik-Šikonja in Cognitive Computation
    Article Open access 26 January 2021
  6. Networking and cryptography library with a non-repudiation flavor for blockchain

    Blockchain is currently one of the most widely discussed inventions in the information and communication technology industry. It is a pillar of the...

    Mohamed Rasslan, Mahmoud M. Nasreldin, ... Heba Aslan in Journal of Computer Virology and Hacking Techniques
    Article Open access 05 August 2023
  7. An authentication mechanism based on blockchain for IoT environment

    The Internet of Things (IoT) is a network where physical objects with unique addresses can connect and communicate with each other through the...

    Gholam Reza Zargar, Hamid Barati, Ali Barati in Cluster Computing
    Article 24 June 2024
  8. Secure privacy-enhanced fast authentication and key management for IoMT-enabled smart healthcare systems

    The smart healthcare system advancements have introduced the Internet of Things, enabling technologies to improve the quality of medical services....

    Sriramulu Bojjagani, Denslin Brabin, ... Umamaheswararao Batta in Computing
    Article 07 May 2024
  9. Proxy signature-based role delegation scheme: formal analysis and simulation

    In the security domain, wide variety of signature schemes are available for providing confidentiality, Integrity and non-repudiation. Proxy signature...

    Aparna Bannore, Rachana Y. Patil, ... Himani Deshpande in International Journal of Information Technology
    Article 14 May 2024
  10. A signcryption with identity-based authentication for secure EHR sharing in IoMT utilizing ECC

    Due to real-time data sharing in the Internet of Medical Things (IoMT), the healthcare sector has evolved significantly in recent years. However,...

    Rachana Y. Patil, Arijit Karati, Yogesh H. Patil in International Journal of Information Technology
    Article 02 July 2024
  11. Provable secure authentication key agreement for wireless body area networks

    Wireless body area networks (WBANs) guarantee timely data processing and secure information preservation within the range of the wireless access...

    Yuqian Ma, Wenbo Shi, ... Qingfeng Cheng in Frontiers of Computer Science
    Article 23 December 2023
  12. Quadratic residue-based unilateral authentication protocol for RFID system

    Nowadays, Radio frequency identification (RFID) plays an important role in many real-life applications for remotely identifying objects. RFID system...

    Pramod Kumar Maurya, Satya Bagchi in Multimedia Tools and Applications
    Article 15 November 2022
  13. A Lightweight Authentication Protocol for a Blockchain-Based Off-Chain Medical Data Access in Multi-server Environment

    Presently, blockchain technology is used to secure electronic medical records (EMR) and an arrangement of multiple servers as off-chain storage is...

    Subhas Barman, Samiran Chattopadhyay, Debasis Samanta in SN Computer Science
    Article 27 February 2024
  14. A lightweight certificate-based authentication scheme for 6LoWPAN-based internet of things

    As the 6LoWPAN devices in the Internet of Things (IoT) applications communicate sensitive information over the unattended and insecure channel, it is...

    Leki Chom Thungon, Subhas Chandra Sahana, Md. Iftekhar Hussain in The Journal of Supercomputing
    Article 15 March 2023
  15. A provably lightweight mutually authentication and key establishment protocol using extended chaotic map for telecare medicine information system

    Telecare Medicine Information System (TMIS) provides patient’s efficient and convenient e-healthcare services where the patient private health...

    Ashish Kamble, Vishesh Gaikwad, Jitendra Tembhurne in International Journal of Information Technology
    Article 24 June 2023
  16. A hyperledger fabric-based EMR sharing mechanisms with proxy re-encryption and IPFS

    With the advent of the information age, data storage has not only developed from paper information systems to electronic information system storage,...

    Der-Chen Huang, Ling-Chun Liu, ... Kuang-Wei Zeng in Cluster Computing
    Article 13 March 2024
  17. PF-AKA: PUF-FSM based Authentication and Key Agreement Framework for IoT based Smart Grid Networks

    Internet of Things (IoTs) is a promising technology that combines communication and data networking. Integration of Smart Grids (SGs) and IoT will...

    Prarthana J. Mehta, Balu L. Parne, Sankita J. Patel in Cluster Computing
    Article 06 April 2024
  18. A password less authentication protocol for multi-server environment using physical unclonable function

    Password-based authentication is the most commonly used method to authenticate users to get online services. In password-based authentication, the...

    E. Praveen Kumar, S. Priyanka in The Journal of Supercomputing
    Article 21 June 2023
  19. An ECC-based mutual data access control protocol for next-generation public cloud

    Through the broad usage of cloud computing and the extensive utilization of next-generation public clouds, people can share valuable information...

    Naveed Khan, Zhang Jianbiao, ... Shehzad Ashraf Chaudhry in Journal of Cloud Computing
    Article Open access 08 July 2023
  20. A secure lightweight mutual authentication scheme in Social Industrial IoT environment

    The Social Industrial Internet of Things (SIIoT) is a new paradigm that integrates social networking features into the Industrial IoT (IIoT)...

    Arij Ben Amor, Sarra Jebri, ... Aref Meddeb in The Journal of Supercomputing
    Article 27 March 2023
Did you find what you were looking for? Share feedback.