Results 21 to 30 of about 4,031 (108)

Improved ECC‐Based Three‐Factor Multiserver Authentication Scheme

open access: yesSecurity and Communication Networks, Volume 2021, Issue 1, 2021., 2021
A multiserver environment can improve the efficiency of mobile network services more effectively than a single server in managing the increase in users. Because of the large number of users, the security of users’ personal information and communication information is more important in a multiserver environment. Recently, Wang et al.
Tsu-Yang Wu   +6 more
wiley   +1 more source

Blockchain as a CA: A Provably Secure Signcryption Scheme Leveraging Blockchains

open access: yesSecurity and Communication Networks, Volume 2021, Issue 1, 2021., 2021
Although encryption and signatures have been two fundamental technologies for cryptosystems, they still receive considerable attention in academia due to the focus on reducing computational costs and communication overhead. In the past decade, applying certificateless signcryption schemes to solve the higher cost of maintaining the certificate chain ...
Tzung-Her Chen   +4 more
wiley   +1 more source

BA2P : Bidirectional and Anonymous Auction Protocol with Dispute‐Freeness

open access: yesSecurity and Communication Networks, Volume 2021, Issue 1, 2021., 2021
Electronic auction is a popular platform to sell goods, task assignment, and resources’ allocation due to reductions of transaction costs and has attracted a huge number of potential buyers. However, it is challenging to address the disputes between the buyer and the auctioneer. The main reason is, on the one hand, solving such problem leverages to the
Ke Huang   +5 more
wiley   +1 more source

Provably Secure ECC‐Based Three‐Factor Authentication Scheme for Mobile Cloud Computing with Offline Registration Centre

open access: yesWireless Communications and Mobile Computing, Volume 2021, Issue 1, 2021., 2021
Mobile cloud computing (MCC) aims at solving the resource constrain problem of smart mobile devices. It has deeply affected the way modern humans live and work. In MCC, the authentication scheme is indispensable to prevent illegal attacks and privacy breaches.
Hongwei Luo   +3 more
wiley   +1 more source

Reliable Reputation Review and Secure Energy Transaction of Microgrid Community Based on Hybrid Blockchain

open access: yesWireless Communications and Mobile Computing, Volume 2021, Issue 1, 2021., 2021
A growing number of prosumers have entered the local power market in response to an increase in the number of residential users who can afford to install distributed energy resources. The traditional microgrid trading platform has many problems, such as low transaction efficiency, the high cost of market maintenance, opaque transactions, and the ...
Zilong Song   +3 more
wiley   +1 more source

Efficient Authentication for Internet of Things Devices in Information Management Systems

open access: yesWireless Communications and Mobile Computing, Volume 2021, Issue 1, 2021., 2021
With the rapid development of the Internet of Things (IoT) technology, it has been widely used in various fields. IoT device as an information collection unit can be built into an information management system with an information processing and storage unit composed of multiple servers. However, a large amount of sensitive data contained in IoT devices
Xiaofeng Wu   +5 more
wiley   +1 more source

Sexting e nativi digitali. Alcuni insegnamenti da una ricerca con studenti francesi [PDF]

open access: yes, 2018
Questo articolo si propone di analizzare le pratiche di sexting, termine che designa l’utilizzo delle tecnologie dell’informazione per scambiare messaggi e contenuti di natura sessuale.
Macilotti, Giorgia
core   +2 more sources

Predicting Future Duration from Present Age: A Critical Assessment [PDF]

open access: yes, 2000
Using a temporal version of the Copernican principle, Gott has proposed a statistical predictor of future longevity based on present age [J. R. Gott III, Nature 363, 315 (1993)] and applied the predictor to a variety of examples, including the longevity ...
Caves, Carlton M.
core   +4 more sources

A Lattice‐Based Authentication Scheme for Roaming Service in Ubiquitous Networks with Anonymity

open access: yesSecurity and Communication Networks, Volume 2020, Issue 1, 2020., 2020
In the ubiquitous networks, mobile nodes can obtain roaming service that enables them to get access to the services extended by their home networks in the field of foreign network. To provide secure and anonymous communication for legal mobile users in roaming services, there should be a mutual authentication between mobile user and foreign agent with ...
Yousheng Zhou   +2 more
wiley   +1 more source

Digital Impedance Bridge for Four-Terminal-Pair AC Resistor Calibration up to 20 kHz

open access: yesMetrology
For this study, a substitution principle-based impedance bridge has been developed to calibrate AC resistors in a four-terminal-pair (4TP) configuration.
Mohamed Ouameur   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy