Results 31 to 40 of about 1,839,877 (306)
Remote user authentication without compromising user anonymity is an emerging area in the last few years. In this paper, we propose a new anonymity preserving mobile user authentication scheme for the global mobility networks (GLOMONETs). We also propose
Soumya Banerjee +6 more
doaj +1 more source
A robust anonymous biometric-based remote user authentication scheme using smart cards
Several biometric-based remote user authentication schemes using smart cards have been proposed in the literature in order to improve the security weaknesses in user authentication system.
Ashok Kumar Das, Adrijit Goswami
doaj +1 more source
Algorithmic statistics: forty years later [PDF]
Algorithmic statistics has two different (and almost orthogonal) motivations. From the philosophical point of view, it tries to formalize how the statistics works and why some statistical models are better than others. After this notion of a "good model"
A Milovanov +32 more
core +2 more sources
Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks
Due to the widespread popularity in both academia and industry, vehicular ad hoc networks (VANETs) have been used in a wide range of applications starting from intelligent transportation to e-health and itinerary planning.
Mohammad Wazid +6 more
doaj +1 more source
De-Authentication Using Ambient Light Sensor
While user authentication happens before initiating or resuming a login session, de-authentication detects the absence of a previously-authenticated user to revoke her currently active login session.
Ankit Gangwal +2 more
doaj +1 more source
A Mean Quantization Watermarking Scheme for Audio Signals Using Singular-Value Decomposition
Recently, research in audio watermarking technology makes it a promising tool for copyright protection of digital audio files in networked environments. In this paper, we propose a new mean quantization based watermarking mechanism for audio based on the
K. Vivekananda Bhat +2 more
doaj +1 more source
Quantum Kolmogorov Complexity and Quantum Key Distribution
We discuss the Bennett-Brassard 1984 (BB84) quantum key distribution protocol in the light of quantum algorithmic information. While Shannon's information theory needs a probability to define a notion of information, algorithmic information theory does ...
A. N. Kolmogorov +9 more
core +1 more source
Multisource algorithmic information theory [PDF]
Multisource information theory is well known in Shannon setting. It studies the possibilities of information transfer through a network with limited capacities. Similar questions could be studied for algorithmic information theory and provide a framework for several known results and interesting questions.
openaire +4 more sources
Algorithmic Networks: central time to trigger expected emergent open-endedness
This article investigates emergence and complexity in complex systems that can share information on a network. To this end, we use a theoretical approach from information theory, computability theory, and complex networks. One key studied question is how
Abrahão, Felipe S. +2 more
core +1 more source
With the rapid growth of the Internet, a lot of electronic patient records (EPRs) have been developed for e-medicine systems. The security and privacy issues of EPRs are important for the patients in order to understand how the hospitals control the use ...
Vanga Odelu +2 more
doaj +1 more source

