Results 41 to 50 of about 44,601 (278)

Security Analysis of Various Authentication Schemes Based on Three Types of Digital Signature Schemes

open access: yesIEEE Access, 2018
To achieve source authentication, message integrity, and non-repudiation, a number of authentication protocols adopt several types of digital signatures: public-key signatures, identity-based signatures, and certificateless signatures.
Kyung-Ah Shim
doaj   +1 more source

Building Secure and Anonymous Communication Channel: Formal Model and its Prototype Implementation [PDF]

open access: yes, 2014
Various techniques need to be combined to realize anonymously authenticated communication. Cryptographic tools enable anonymous user authentication while anonymous communication protocols hide users' IP addresses from service providers.
Emura, Keita   +3 more
core  

Oil‐Coated Nanoplastics Induce Rapid Membrane Disruption and Severe Intestinal Injury

open access: yesAdvanced Science, EarlyView.
Oil‐rich food contact dramatically amplifies MNP release from plastic takeout containers, producing oil‐coated nanoplastics with altered surface properties and rapid membrane‐disruptive effects. These particles cause severe intestinal barrier damage and immune dysfunction in mice, and risk modeling suggests that long‐term gastrointestinal burdens may ...
Ruwen Xie   +17 more
wiley   +1 more source

An Improved Anonymous Authentication Protocol for Location-Based Service

open access: yesIEEE Access, 2019
The authentication protocols are implemented to provide identity authentication for communication entities. With the increasing demand of network security and the development of technology, the anonymous authentication protocol for LBS (location based ...
Cao Shouqi   +4 more
doaj   +1 more source

Multi-server Anonymous Authentication Scheme Based on Smart Card [PDF]

open access: yesJisuanji gongcheng, 2016
Through the analysis of robust smart card authentication scheme for multi-server architecture,it is found that this scheme does not fully realize user anonymous authentication,and exists Denial of Service(DoS) attack,smart card breach attack and other ...
WANG Mao,WANG Xiaoming
doaj   +1 more source

A-MAKE: an efficient, anonymous and accountable authentication framework for WMNs [PDF]

open access: yes, 2010
In this paper, we propose a framework, named as A-MAKE, which efficiently provides security, privacy, and accountability for communications in wireless mesh networks.
Durahim, Onur Ahmet   +2 more
core   +1 more source

Multimodal Wearable Biosensing Meets Multidomain AI: A Pathway to Decentralized Healthcare

open access: yesAdvanced Science, EarlyView.
Multimodal biosensing meets multidomain AI. Wearable biosensors capture complementary biochemical and physiological signals, while cross‐device, population‐aware learning aligns noisy, heterogeneous streams. This Review distills key sensing modalities, fusion and calibration strategies, and privacy‐preserving deployment pathways that transform ...
Chenshu Liu   +10 more
wiley   +1 more source

Efficient anonymous reputation-based revocation without TTP

open access: yesTongxin xuebao, 2014
The security problems in PE(AR)2are pointed out then a new TTP-free scheme is proposed to supports anony-mous reputation-based revocation. This scheme allows the SP(service provider) to assign positive or negative scores to anonymous sessions and block ...
Li XI, ENGDeng-guo F
doaj   +2 more sources

Reconfigurable Security: Edge Computing-based Framework for IoT

open access: yes, 2017
In various scenarios, achieving security between IoT devices is challenging since the devices may have different dedicated communication standards, resource constraints as well as various applications.
Chen, Jyh-Cheng   +3 more
core   +1 more source

Cooperative anonymity authentication in Vehicular Networks [PDF]

open access: yes2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009
Data privacy in Vehicular Ad hoc Networks (VANETs) is a practical issue currently under investigation. Privacy-preserving anonymity authentication in networks is a challenging topic related to security, anonymity, network, and data privacy. Existing anonymity authentication in VANET is based on a k-anonymity model.
Jianmin Chen, Jie Wu
openaire   +1 more source

Home - About - Disclaimer - Privacy