Ara
Toplam kayıt 5, listelenen: 1-5
A secure and lightweight authentication scheme for next generation IoT infrastructure
(ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2021)
While the 6G/IoT transition is on the cards, the real advantage of this transition can be realized only if the user
privacy and security are guaranteed. The smartcard and password based authentication protocols can help ...
A clogging resistant secure authentication scheme for fog computing services
(ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2021)
Fog computing (FC) is an infrastructure consisting of decentralized computing, where computing resources such
as storage, applications, and data are scattered among the cloud and data source. Fog computing inherits ...
Amassing the Security: An ECC-Based Authentication Scheme for Internet of Drones
(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2021)
The continuous innovation and progression in hardware, software and communication technologies helped the expansion and accelerated growth in Internet of Things based drone
networks (IoD), for the devices, applications ...
A secure demand response management authentication scheme for smart grid
(ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2021)
The electricity demands are floated through smart grid (SG) devices to a remote power management system and
utility center (UC) for utilizing energy-based services, while the UCs manage the distribution of power. Nevertheless, ...
A secure and improved multi server authentication protocol using fuzzy commitment
(SPRINGER, VAN GODEWIJCKSTRAAT 30, 3311 GZ DORDRECHT, NETHERLANDS, 2021)
The advancement in communication and computation technologies has paved a way for
connecting large number of heterogeneous devices to offer specified services. Still, the
advantages of this advancement are not realized ...