Search
Search Results
-
A Lightweight Authentication Protocol for a Blockchain-Based Off-Chain Medical Data Access in Multi-server Environment
Presently, blockchain technology is used to secure electronic medical records (EMR) and an arrangement of multiple servers as off-chain storage is...
-
Edge server placement problem in multi-access edge computing environment: models, techniques, and applications
Multi-Access Edge Computing (MEC) is known as a promising communication paradigm that enables IoT and 5G scenarios by using edge servers located in...
-
A design of provably secure multi-factor ECC-based authentication protocol in multi-server cloud architecture
The emerging cloud infrastructure has escalated number of servers offering flexible and diverse remote services through public channels. However,...
-
Quantum-safe multi-server password-based authenticated key exchange protocol
Password-based authentication is one of the most prevailing access control mechanism. Typical password-authenticated key exchange (PAKE) protocols...
-
Provable user authentication scheme on ECC in multi-server environment
Authentic communication is an inevitable trend in the fourth industrial revolution. In a city, the convenient administrative formalities should be...
-
AMAKAS: Anonymous Mutual Authentication and Key Agreement Scheme for securing multi-server environments
The rapid growth of Internet users was the motivation of the emerge appearance of new computing models such as cloud computing, fog computing and...
-
A password less authentication protocol for multi-server environment using physical unclonable function
Password-based authentication is the most commonly used method to authenticate users to get online services. In password-based authentication, the...
-
A group key-based lightweight Mutual Authentication and Key Agreement (MAKA) protocol for multi-server environment
Use of Internet-of-Things (IoT)-based wireless applications has been exponentially increased nowadays and likely to accelerate in near future. Thus,...
-
An enhanced smart card and dynamic ID based remote multi-server user authentication scheme
Organizations often use smart card-based user authentication for remote access. The research community has put forward dynamic identity based remote...
-
Dynamic Multi-server Updatable Encryption
In this paper, we propose the Dynamic Multi-Server Updatable Encryption (DMUE) primitive as an extension of standard public-key updatable encryption.... -
Hybrid SDN Networks: A Multi-parameter Server Load Balancing Scheme
Software-defined networking (SDN) provides many benefits, including traffic programmability, agility, and network automation. However, budget...
-
I/O separation scheme on Lustre metadata server based on multi-stream SSD
As the price of NAND-flash storage decreases, large-scale backend distributed file systems are being constructed as all-flash storage without HDDs....
-
CBLA_PM: an improved ann-based power consumption prediction algorithm for multi-type jobs on heterogeneous computing server
Numerous data centers have adopted heterogeneous computing server to accelerate the processing speed with various applications. However, as the...
-
A multi-server biometric authentication scheme based on extended chaotic map for telecare medical information system
Telemedicine Information System (TMIS) is a platform for data communication and exchange between patients and medical servers via the Internet....
-
A Multi-server Authentication Scheme Based on Fuzzy Extractor
Biometrics have been widely used in various authentication occasions, especially in the Internet field. However, the security of biometrics has... -
SMCoEdge: Simultaneous Multi-server Offloading for Collaborative Mobile Edge Computing
Collaborative Mobile Edge Computing (MEC) has emerged as a promising solution for low service delay in computation-intensive Internet of Things (IoT)... -
Strategic Customer Behaviors in Observable Multi-server Batch Service Queueing Systems with Shared Fee and Server Maintenance Cost
We consider an observable multi-server batch service queueing model where a shared server admission fee and maintenance cost for the monopolist are... -
Research on Homomorphic Retrieval Method of Private Database Secrets in Multi-server Environment
The traditional homomorphism retrieval method of privacy database is very complicated. In order to reduce the running time, this paper designs a... -
Anonymous and Practical Multi-factor Authentication for Mobile Devices Using Two-Server Architecture
At present, password authentication technology using single-server architecture has been widely used in practice. However, it cannot resist internal... -
Efficient 3D object recognition in mobile edge environment
3D object recognition has great research and application value in the fields of automatic drive, virtual reality, and commercial manufacturing....