Ara
Toplam kayıt 50, listelenen: 41-50
A seamless anonymous authentication protocol for mobile edge computing infrastructure
(ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2022)
Mobile Edge Computing (MEC) accommodates processing and data storage and manipulation capabilities
across the scope of wireless network. In MEC environment, MEC servers along with the computing and
storage capabilities ...
Towards Secure IoT-Based Payments by Extension of Payment Card Industry Data Security Standard (PCI DSS)
(WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2022)
IoT emergence has given rise to a new digital experience of payment transactions where physical objects like refrigerators, cars,
and wearables will make payments. These physical objects will be storing the cardholder ...
An Improved Authentication Scheme for Digital Rights Management System
(WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2022)
With the increasing number and popularity of digital content, the management of digital access rights has become an utmost
important field. Through digital rights management systems (DRM-S), access to digital contents can ...
SKIA-SH: A Symmetric Key-Based Improved Lightweight Authentication Scheme for Smart Homes
(WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2022)
Being one of the finest applications of the IoT, smart homes (SHs) with an aim to improve quality of life are taking over the traditional lifestyles. The entities within a SH communicate with each other and with the ...
PFLUA-DIoT: A Pairing Free Lightweight and Unlinkable User Access Control Scheme for Distributed IoT Environments
(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2022)
The Internet of Things (IoT) connects enormous objects through various sensors to facilitate daily life by interconnecting the information space with the decision-makers. Security and
privacy are, however, the main concerns ...
A resource friendly authentication scheme for space–air–ground–sea integrated Maritime Communication Network
(PERGAMON-ELSEVIER SCIENCE LTD, THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, ENGLAND, 2022)
Recently, the demand for a faster , low-latency, and full-coverage Maritime Communication Network (MCN) has
gained attention as marine operations have increased substantially. Using modern information network technologies ...
An enhanced scheme for mutual authentication for healthcare services
(KEAI PUBLISHING LTD, 16 DONGHUANGCHENGGEN NORTH ST, BEIJING, DONGCHENG DISTRICT 100717, PEOPLES R CHINA, 2022)
With the advent of state-of-art technologies, the Telecare Medicine Information System (TMIS) now offers fast and
convenient healthcare services to patients at their doorsteps. However, this architecture engenders new ...
A Robust Access Control Protocol for the Smart Grid Systems
(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2022)
Lightweight cryptography (LWC)-based authenticated encryption with associative data (AEAD) cryptographic
primitives require fewer computational and energy resources
than conventional cryptographic primitives as a single ...
A provably secure and lightweight mutual authentication protocol in fog-enabled social Internet of vehicles
(SAGE PUBLICATIONS INC, 2455 TELLER RD, THOUSAND OAKS, CA 91320, 2022)
The Internet of vehicles technology has developed rapidly in recent years and has become increasingly important. The
social Internet of vehicles provides better resources and services for the development of the Internet ...
A Privacy Enhanced Authentication Scheme for Securing Smart Grid Infrastructure
(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2022)
The rapid advancements in smart grid (SG)
technology extend a large number of applications including
vehicle charging, smart buildings, and smart cities through
the efficient use of advanced communication architecture ...