Ara
Toplam kayıt 55, listelenen: 31-40
ITSSAKA-MS: An Improved Three-Factor Symmetric-Key Based Secure AKA Scheme for Multi-Server Environments
(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2020)
A variety of three-factor smart-card based schemes, specifically designed for telecare medicine
information systems (TMIS) are available for remote user authentication. Most of the existing schemes for
TMIS are customarily ...
Artificial intelligence technology for diagnosing COVID-19 cases: a review of substantial issues
(VERDUCI PUBLISHER, VIA GREGORIO VII, ROME 186-00165, ITALY, 2020)
Today, the world suffers from the
rapid spread of COVID-19, which has claimed
thousands of lives. Unfortunately, its treatment
is yet to be developed. Nevertheless, this phenomenon can be decelerated by diagnosing
and ...
A Novel Pairing-Free Lightweight Authentication Protocol for Mobile Cloud Computing Framework
(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2021)
The mobile cloud computing (MCC) refers to an infrastructure that integrates cloud computing and mobile computing, and it has changed a great deal, the service provisioning of applications, which requires to get the data ...
A Secure and Reliable Device Access Control Scheme for IoT Based Sensor Cloud Systems
(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2020)
Among other security concerns, the reliable device to device direct communication is an
important research aspect in sensor cloud system application of Internet of things (IoT). The access control
mechanism can ensure ...
An Improved SIP Authenticated Key Agreement Based on Dongqing et al.
(SPRINGER, ONE NEW YORK PLAZA, SUITE 4600 , NEW YORK, NY 10004, UNITED STATES, 2020)
The IP multimedia subsystem represents an architectural framework to support multimedia-based services using internet protocol over wired and wireless media. These IP-based
multimedia services rely on session initiation ...
Sixth Generation (6G) Wireless Networks: Vision, Research Activities, Challenges and Potential Solutions
(MDPI, ST ALBAN-ANLAGE 66, CH-4052 BASEL, SWITZERLAND, 2020)
The standardization activities of the fifth generation communications are clearly over
and deployment has commenced globally. To sustain the competitive edge of wireless networks,
industrial and academia synergy have ...
A secure and improved multi server authentication protocol using fuzzy commitment
(SPRINGER, VAN GODEWIJCKSTRAAT 30, 3311 GZ DORDRECHT, NETHERLANDS, 2021)
The advancement in communication and computation technologies has paved a way for
connecting large number of heterogeneous devices to offer specified services. Still, the
advantages of this advancement are not realized ...
REAS-TMIS: Resource-Efficient Authentication Scheme for Telecare Medical Information System
(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2022)
The phenomenal growth of smartphones and wearable devices has begun crowd-sourcing applications for the Internet of Things (IoT). E-healthcare is considered the essential service for crowd-sourcing
IoT applications that ...
A Lightweight and Robust User Authentication Protocol with User Anonymity for IoT-Based Healthcare
(TECH SCIENCE PRESS, 871 CORONADO CENTER DR, SUTE 200, HENDERSON, NV 89052, 2022)
With the rise of the Internet of Things (IoT), the word “intelligent medical care” has increasingly become a major
vision. Intelligent medicine adopts the most advanced IoT technology to realize the interaction between ...
A low-cost privacy preserving user access in mobile edge computing framework
(PERGAMON-ELSEVIER SCIENCE LTD, THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, ENGLAND, 2022)
The computational offloading from conventional cloud datacenter towards edge devices sprouted
a new world of prospective applications in pervasive and Mobile Edge Computing (MEC) paradigm, leading to substantial gains in ...