Results 91 to 100 of about 44,601 (278)
Improved direct anonymous attestation scheme for mobile computing platforms
The security flaws of a direct anonymous attestation scheme proposed by Ge,et al.Were analyzed,and the re-sult shows that the authentication protocol of the scheme is vulnerable to reply attacks and platform masquerade attacks when being used for remote ...
Li YANG +3 more
doaj +2 more sources
ABSTRACT Objectives The assessment of Compulsive Sexual Behavior (CSB) requires fine‐grained assessment approaches, ideally through clinical interviews. However, none of the few available clinical interviews for CSB have demonstrated strong psychometric properties.
J. Castro‐Calvo +5 more
wiley +1 more source
Software-defined Perimeter Anonymous Authentication Scheme Based on Verifiable Credentials [PDF]
The standard SDP architecture employs identity-based authentication and authorization strategies to monitor and audit access activities in real time.However,users must fully disclose their identity information to obtain access,potentially exposing ...
SI Xuege, JIA Hongyong, LI Weixian, ZENG Junjie , MEN Ruirui
doaj +1 more source
Lattice-based group signatures with forward security for anonymous authentication. [PDF]
Chen S, Chen J.
europepmc +1 more source
ABSTRACT The persistence of participatory budgeting (PB) in selected Chinese localities challenges the conventional wisdom that deliberative democratic practices can only take root in liberal political environments. Yet, existing literature has not sufficiently elucidated the factors underpinning the rise and sustained operation of PB in this seemingly
Yifei Yan +3 more
wiley +1 more source
Decentralized k-Times Anonymous Attribute Authentication Supporting Blacklist [PDF]
As cloud computing and data services become increasingly prevalent, the demand for privacy protection and data security has increased. Traditional anonymous authentication schemes can safeguard user privacy but often lack effective user access control ...
TAO Jingyi, PENG Lingqi, KAN Haibin
doaj +1 more source
An Anonymous Authentication and Key Update Mechanism for IoT Devices Based on EnOcean Protocol. [PDF]
Wu Y, Feng T.
europepmc +1 more source
ABSTRACT The reform of public institutions has attracted sustained attention in both scholarship and policymaking. Increasingly, however, there is growing recognition that reforms are rarely implemented in an institutional vacuum. Instead, new reforms are layered onto existing arrangements, producing hybrid institutional landscapes shaped by prior ...
Edidiong Bassey
wiley +1 more source
Research on batch anonymous authentication scheme for VANET based on bilinear pairing
To solve the problem of efficiency of anonymous authentication in vehicular ad hoc network,a batch anonymous authentication scheme was proposed by using bilinear pairing on elliptic curves .The signature was generated by the roadside unit node (RSU) and ...
Cheng SONG +5 more
doaj +2 more sources
Lightweight Anonymous Authentication and Key Agreement Protocol Based on CoAP of Internet of Things. [PDF]
Gong X, Feng T.
europepmc +1 more source

