Results 41 to 50 of about 44,601 (278)
To achieve source authentication, message integrity, and non-repudiation, a number of authentication protocols adopt several types of digital signatures: public-key signatures, identity-based signatures, and certificateless signatures.
Kyung-Ah Shim
doaj +1 more source
Building Secure and Anonymous Communication Channel: Formal Model and its Prototype Implementation [PDF]
Various techniques need to be combined to realize anonymously authenticated communication. Cryptographic tools enable anonymous user authentication while anonymous communication protocols hide users' IP addresses from service providers.
Emura, Keita +3 more
core
Oil‐Coated Nanoplastics Induce Rapid Membrane Disruption and Severe Intestinal Injury
Oil‐rich food contact dramatically amplifies MNP release from plastic takeout containers, producing oil‐coated nanoplastics with altered surface properties and rapid membrane‐disruptive effects. These particles cause severe intestinal barrier damage and immune dysfunction in mice, and risk modeling suggests that long‐term gastrointestinal burdens may ...
Ruwen Xie +17 more
wiley +1 more source
An Improved Anonymous Authentication Protocol for Location-Based Service
The authentication protocols are implemented to provide identity authentication for communication entities. With the increasing demand of network security and the development of technology, the anonymous authentication protocol for LBS (location based ...
Cao Shouqi +4 more
doaj +1 more source
Multi-server Anonymous Authentication Scheme Based on Smart Card [PDF]
Through the analysis of robust smart card authentication scheme for multi-server architecture,it is found that this scheme does not fully realize user anonymous authentication,and exists Denial of Service(DoS) attack,smart card breach attack and other ...
WANG Mao,WANG Xiaoming
doaj +1 more source
A-MAKE: an efficient, anonymous and accountable authentication framework for WMNs [PDF]
In this paper, we propose a framework, named as A-MAKE, which efficiently provides security, privacy, and accountability for communications in wireless mesh networks.
Durahim, Onur Ahmet +2 more
core +1 more source
Multimodal Wearable Biosensing Meets Multidomain AI: A Pathway to Decentralized Healthcare
Multimodal biosensing meets multidomain AI. Wearable biosensors capture complementary biochemical and physiological signals, while cross‐device, population‐aware learning aligns noisy, heterogeneous streams. This Review distills key sensing modalities, fusion and calibration strategies, and privacy‐preserving deployment pathways that transform ...
Chenshu Liu +10 more
wiley +1 more source
Efficient anonymous reputation-based revocation without TTP
The security problems in PE(AR)2are pointed out then a new TTP-free scheme is proposed to supports anony-mous reputation-based revocation. This scheme allows the SP(service provider) to assign positive or negative scores to anonymous sessions and block ...
Li XI, ENGDeng-guo F
doaj +2 more sources
Reconfigurable Security: Edge Computing-based Framework for IoT
In various scenarios, achieving security between IoT devices is challenging since the devices may have different dedicated communication standards, resource constraints as well as various applications.
Chen, Jyh-Cheng +3 more
core +1 more source
Cooperative anonymity authentication in Vehicular Networks [PDF]
Data privacy in Vehicular Ad hoc Networks (VANETs) is a practical issue currently under investigation. Privacy-preserving anonymity authentication in networks is a challenging topic related to security, anonymity, network, and data privacy. Existing anonymity authentication in VANET is based on a k-anonymity model.
Jianmin Chen, Jie Wu
openaire +1 more source

