Results 21 to 30 of about 4,031 (108)
Improved ECC‐Based Three‐Factor Multiserver Authentication Scheme
A multiserver environment can improve the efficiency of mobile network services more effectively than a single server in managing the increase in users. Because of the large number of users, the security of users’ personal information and communication information is more important in a multiserver environment. Recently, Wang et al.
Tsu-Yang Wu +6 more
wiley +1 more source
Blockchain as a CA: A Provably Secure Signcryption Scheme Leveraging Blockchains
Although encryption and signatures have been two fundamental technologies for cryptosystems, they still receive considerable attention in academia due to the focus on reducing computational costs and communication overhead. In the past decade, applying certificateless signcryption schemes to solve the higher cost of maintaining the certificate chain ...
Tzung-Her Chen +4 more
wiley +1 more source
BA2P : Bidirectional and Anonymous Auction Protocol with Dispute‐Freeness
Electronic auction is a popular platform to sell goods, task assignment, and resources’ allocation due to reductions of transaction costs and has attracted a huge number of potential buyers. However, it is challenging to address the disputes between the buyer and the auctioneer. The main reason is, on the one hand, solving such problem leverages to the
Ke Huang +5 more
wiley +1 more source
Mobile cloud computing (MCC) aims at solving the resource constrain problem of smart mobile devices. It has deeply affected the way modern humans live and work. In MCC, the authentication scheme is indispensable to prevent illegal attacks and privacy breaches.
Hongwei Luo +3 more
wiley +1 more source
A growing number of prosumers have entered the local power market in response to an increase in the number of residential users who can afford to install distributed energy resources. The traditional microgrid trading platform has many problems, such as low transaction efficiency, the high cost of market maintenance, opaque transactions, and the ...
Zilong Song +3 more
wiley +1 more source
Efficient Authentication for Internet of Things Devices in Information Management Systems
With the rapid development of the Internet of Things (IoT) technology, it has been widely used in various fields. IoT device as an information collection unit can be built into an information management system with an information processing and storage unit composed of multiple servers. However, a large amount of sensitive data contained in IoT devices
Xiaofeng Wu +5 more
wiley +1 more source
Sexting e nativi digitali. Alcuni insegnamenti da una ricerca con studenti francesi [PDF]
Questo articolo si propone di analizzare le pratiche di sexting, termine che designa l’utilizzo delle tecnologie dell’informazione per scambiare messaggi e contenuti di natura sessuale.
Macilotti, Giorgia
core +2 more sources
Predicting Future Duration from Present Age: A Critical Assessment [PDF]
Using a temporal version of the Copernican principle, Gott has proposed a statistical predictor of future longevity based on present age [J. R. Gott III, Nature 363, 315 (1993)] and applied the predictor to a variety of examples, including the longevity ...
Caves, Carlton M.
core +4 more sources
A Lattice‐Based Authentication Scheme for Roaming Service in Ubiquitous Networks with Anonymity
In the ubiquitous networks, mobile nodes can obtain roaming service that enables them to get access to the services extended by their home networks in the field of foreign network. To provide secure and anonymous communication for legal mobile users in roaming services, there should be a mutual authentication between mobile user and foreign agent with ...
Yousheng Zhou +2 more
wiley +1 more source
Digital Impedance Bridge for Four-Terminal-Pair AC Resistor Calibration up to 20 kHz
For this study, a substitution principle-based impedance bridge has been developed to calibrate AC resistors in a four-terminal-pair (4TP) configuration.
Mohamed Ouameur +2 more
doaj +1 more source

