We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. A Lightweight Authentication Protocol for a Blockchain-Based Off-Chain Medical Data Access in Multi-server Environment

    Presently, blockchain technology is used to secure electronic medical records (EMR) and an arrangement of multiple servers as off-chain storage is...

    Subhas Barman, Samiran Chattopadhyay, Debasis Samanta in SN Computer Science
    Article 27 February 2024
  2. Edge server placement problem in multi-access edge computing environment: models, techniques, and applications

    Multi-Access Edge Computing (MEC) is known as a promising communication paradigm that enables IoT and 5G scenarios by using edge servers located in...

    Bahareh Bahrami, Mohammad Reza Khayyambashi, Seyedali Mirjalili in Cluster Computing
    Article 22 May 2023
  3. A design of provably secure multi-factor ECC-based authentication protocol in multi-server cloud architecture

    The emerging cloud infrastructure has escalated number of servers offering flexible and diverse remote services through public channels. However,...

    Shivangi Shukla, Sankita J. Patel in Cluster Computing
    Article 29 May 2023
  4. Quantum-safe multi-server password-based authenticated key exchange protocol

    Password-based authentication is one of the most prevailing access control mechanism. Typical password-authenticated key exchange (PAKE) protocols...

    Lin Chen, Tongzhou Qu, Anqi Yin in Multimedia Tools and Applications
    Article 18 January 2024
  5. Provable user authentication scheme on ECC in multi-server environment

    Authentic communication is an inevitable trend in the fourth industrial revolution. In a city, the convenient administrative formalities should be...

    Toan-Thinh Truong, Minh-Triet Tran, ... Trong-Nguyen Nguyen in The Journal of Supercomputing
    Article 18 July 2022
  6. AMAKAS: Anonymous Mutual Authentication and Key Agreement Scheme for securing multi-server environments

    The rapid growth of Internet users was the motivation of the emerge appearance of new computing models such as cloud computing, fog computing and...

    Fatty M. Salem, Maha Safwat, ... Shahira Habashy in Journal of Cloud Computing
    Article Open access 30 August 2023
  7. A password less authentication protocol for multi-server environment using physical unclonable function

    Password-based authentication is the most commonly used method to authenticate users to get online services. In password-based authentication, the...

    E. Praveen Kumar, S. Priyanka in The Journal of Supercomputing
    Article 21 June 2023
  8. A group key-based lightweight Mutual Authentication and Key Agreement (MAKA) protocol for multi-server environment

    Use of Internet-of-Things (IoT)-based wireless applications has been exponentially increased nowadays and likely to accelerate in near future. Thus,...

    Prasanta Kumar Roy, Ansuman Bhattacharya in The Journal of Supercomputing
    Article 07 October 2021
  9. An enhanced smart card and dynamic ID based remote multi-server user authentication scheme

    Organizations often use smart card-based user authentication for remote access. The research community has put forward dynamic identity based remote...

    Nitish Andola, Sourabh Prakash, ... Shekhar Verma in Cluster Computing
    Article 11 May 2022
  10. Dynamic Multi-server Updatable Encryption

    In this paper, we propose the Dynamic Multi-Server Updatable Encryption (DMUE) primitive as an extension of standard public-key updatable encryption....
    Jodie Knapp, Elizabeth A. Quaglia in Information Security
    Conference paper 2023
  11. Hybrid SDN Networks: A Multi-parameter Server Load Balancing Scheme

    Software-defined networking (SDN) provides many benefits, including traffic programmability, agility, and network automation. However, budget...

    Teodor Malbašić, Petar D. Bojović, ... Dušan Vujošević in Journal of Network and Systems Management
    Article 27 January 2022
  12. I/O separation scheme on Lustre metadata server based on multi-stream SSD

    As the price of NAND-flash storage decreases, large-scale backend distributed file systems are being constructed as all-flash storage without HDDs....

    Cheongjun Lee, Jaehwan Lee, ... Hyeonsang Eom in Cluster Computing
    Article 17 November 2022
  13. CBLA_PM: an improved ann-based power consumption prediction algorithm for multi-type jobs on heterogeneous computing server

    Numerous data centers have adopted heterogeneous computing server to accelerate the processing speed with various applications. However, as the...

    Chao **g, Jiaming Li in Cluster Computing
    Article 04 January 2023
  14. A multi-server biometric authentication scheme based on extended chaotic map for telecare medical information system

    Telemedicine Information System (TMIS) is a platform for data communication and exchange between patients and medical servers via the Internet....

    **ao-Ying Zhai, Jian Wang in Multimedia Tools and Applications
    Article 06 May 2022
  15. A Multi-server Authentication Scheme Based on Fuzzy Extractor

    Biometrics have been widely used in various authentication occasions, especially in the Internet field. However, the security of biometrics has...
    Wang Cheng, Lin You, Gengran Hu in Algorithms and Architectures for Parallel Processing
    Conference paper 2024
  16. SMCoEdge: Simultaneous Multi-server Offloading for Collaborative Mobile Edge Computing

    Collaborative Mobile Edge Computing (MEC) has emerged as a promising solution for low service delay in computation-intensive Internet of Things (IoT)...
    Changfu Xu, Yupeng Li, ... Tian Wang in Algorithms and Architectures for Parallel Processing
    Conference paper 2024
  17. Strategic Customer Behaviors in Observable Multi-server Batch Service Queueing Systems with Shared Fee and Server Maintenance Cost

    We consider an observable multi-server batch service queueing model where a shared server admission fee and maintenance cost for the monopolist are...
    Ayane Nakamura, Tuan Phung-Duc in Performance Evaluation Methodologies and Tools
    Conference paper 2023
  18. Research on Homomorphic Retrieval Method of Private Database Secrets in Multi-server Environment

    The traditional homomorphism retrieval method of privacy database is very complicated. In order to reduce the running time, this paper designs a...
    Fu-lian Zhong, **-hua Liu in IoT and Big Data Technologies for Health Care
    Conference paper 2022
  19. Anonymous and Practical Multi-factor Authentication for Mobile Devices Using Two-Server Architecture

    At present, password authentication technology using single-server architecture has been widely used in practice. However, it cannot resist internal...
    Conference paper 2023
  20. Efficient 3D object recognition in mobile edge environment

    3D object recognition has great research and application value in the fields of automatic drive, virtual reality, and commercial manufacturing....

    Mofei Song, Qi Guo in Journal of Cloud Computing
    Article Open access 10 December 2022
Did you find what you were looking for? Share feedback.