Results 31 to 40 of about 1,839,877 (306)

Design of an Anonymity-Preserving Group Formation Based Authentication Protocol in Global Mobility Networks

open access: yesIEEE Access, 2018
Remote user authentication without compromising user anonymity is an emerging area in the last few years. In this paper, we propose a new anonymity preserving mobile user authentication scheme for the global mobility networks (GLOMONETs). We also propose
Soumya Banerjee   +6 more
doaj   +1 more source

A robust anonymous biometric-based remote user authentication scheme using smart cards

open access: yesJournal of King Saud University: Computer and Information Sciences, 2015
Several biometric-based remote user authentication schemes using smart cards have been proposed in the literature in order to improve the security weaknesses in user authentication system.
Ashok Kumar Das, Adrijit Goswami
doaj   +1 more source

Algorithmic statistics: forty years later [PDF]

open access: yes, 2017
Algorithmic statistics has two different (and almost orthogonal) motivations. From the philosophical point of view, it tries to formalize how the statistics works and why some statistical models are better than others. After this notion of a "good model"
A Milovanov   +32 more
core   +2 more sources

Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks

open access: yesIEEE Access, 2017
Due to the widespread popularity in both academia and industry, vehicular ad hoc networks (VANETs) have been used in a wide range of applications starting from intelligent transportation to e-health and itinerary planning.
Mohammad Wazid   +6 more
doaj   +1 more source

De-Authentication Using Ambient Light Sensor

open access: yesIEEE Access
While user authentication happens before initiating or resuming a login session, de-authentication detects the absence of a previously-authenticated user to revoke her currently active login session.
Ankit Gangwal   +2 more
doaj   +1 more source

A Mean Quantization Watermarking Scheme for Audio Signals Using Singular-Value Decomposition

open access: yesIEEE Access, 2019
Recently, research in audio watermarking technology makes it a promising tool for copyright protection of digital audio files in networked environments. In this paper, we propose a new mean quantization based watermarking mechanism for audio based on the
K. Vivekananda Bhat   +2 more
doaj   +1 more source

Quantum Kolmogorov Complexity and Quantum Key Distribution

open access: yes, 2009
We discuss the Bennett-Brassard 1984 (BB84) quantum key distribution protocol in the light of quantum algorithmic information. While Shannon's information theory needs a probability to define a notion of information, algorithmic information theory does ...
A. N. Kolmogorov   +9 more
core   +1 more source

Multisource algorithmic information theory [PDF]

open access: yes, 2017
Multisource information theory is well known in Shannon setting. It studies the possibilities of information transfer through a network with limited capacities. Similar questions could be studied for algorithmic information theory and provide a framework for several known results and interesting questions.
openaire   +4 more sources

Algorithmic Networks: central time to trigger expected emergent open-endedness

open access: yes, 2019
This article investigates emergence and complexity in complex systems that can share information on a network. To this end, we use a theoretical approach from information theory, computability theory, and complex networks. One key studied question is how
Abrahão, Felipe S.   +2 more
core   +1 more source

A secure effective dynamic group password-based authenticated key agreement scheme for the integrated EPR information system

open access: yesJournal of King Saud University: Computer and Information Sciences, 2016
With the rapid growth of the Internet, a lot of electronic patient records (EPRs) have been developed for e-medicine systems. The security and privacy issues of EPRs are important for the patients in order to understand how the hospitals control the use ...
Vanga Odelu   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy