Results 31 to 40 of about 2,279,222 (327)

UCAP:a PCL secure user authentication protocol in cloud computing

open access: yesTongxin xuebao, 2018
As the combine of cloud computing and Internet breeds many flexible IT services,cloud computing becomes more and more significant.In cloud computing,a user should be authenticated by a trusted third party or a certification authority before using cloud ...
Xuefeng LI, Junwei ZHANG, Jianfeng MA
doaj   +2 more sources

A Survey on Key Agreement and Authentication Protocol for Internet of Things Application

open access: yesIEEE Access
The Internet of Things (IoT) represents a dynamic infrastructure, leveraging sensing and network communication technology to establish ubiquitous connectivity among people, machines, and objects.
M. Hasan   +4 more
semanticscholar   +1 more source

Secure and Efficient WBAN Authentication Protocols for Intra-BAN Tier

open access: yesJournal of Sensor and Actuator Networks, 2022
Telecare medical information system (TMIS) is a technology used in a wireless body area network (WBAN), which has a crucial role in healthcare services.
Abdullah M. Almuhaideb, Huda A. Alghamdi
doaj   +1 more source

Verifying Authentication Protocol Implementations [PDF]

open access: yes, 2002
Formal methods for verifying authentication protocols tend to assume an idealised, perfect form of encryption. This approach has been spectacularly successful in finding flaws, but when we aim for proofs of correctness then we need to consider this assumption more carefully, and perhaps to weaken it to reflect properties of real cryptographic ...
openaire   +3 more sources

Quantum authentication protocol

open access: yes, 2000
In this letter, we proposed a quantum authentication protocol. The authentication process is implemented by the symmetric cryptographic scheme with quantum effects.
Zeng, Guihua, Guo, Guangcan
openaire   +2 more sources

Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment

open access: yesIEEE Transactions on Industrial Informatics, 2020
Secure real-time data about goods in transit in supply chains needs bandwidth having capacity that is not fulfilled with the current infrastructure. Hence, 5G-enabled Internet of Things (IoT) in mobile edge computing is intended to substantially increase
Srinivas Jangirala, A. Das, A. Vasilakos
semanticscholar   +1 more source

Enteropathogenic E. coli shows delayed attachment and host response in human jejunum organoid‐derived monolayers compared to HeLa cells

open access: yesFEBS Letters, EarlyView.
Enteropathogenic E. coli (EPEC) infects the human intestinal epithelium, resulting in severe illness and diarrhoea. In this study, we compared the infection of cancer‐derived cell lines with human organoid‐derived models of the small intestine. We observed a delayed in attachment, inflammation and cell death on primary cells, indicating that host ...
Mastura Neyazi   +5 more
wiley   +1 more source

A secure and private RFID authentication protocol based on quadratic residue [PDF]

open access: yes, 2012
Radio Frequency IDentification based systems are getting pervasively deployed in many real-life applications in various settings for identification and authentication of remote objects.
Kardaş, Süleyman   +3 more
core  

Hardware Implementation of the GPS authentication [PDF]

open access: yes, 2012
In this paper, we explore new area/throughput trade- offs for the Girault, Poupard and Stern authentication protocol (GPS). This authentication protocol was selected in the NESSIE competition and is even part of the standard ISO/IEC 9798. The originality
Dardaillon, Mickaël   +2 more
core   +4 more sources

Organoids in pediatric cancer research

open access: yesFEBS Letters, EarlyView.
Organoid technology has revolutionized cancer research, yet its application in pediatric oncology remains limited. Recent advances have enabled the development of pediatric tumor organoids, offering new insights into disease biology, treatment response, and interactions with the tumor microenvironment.
Carla Ríos Arceo, Jarno Drost
wiley   +1 more source

Home - About - Disclaimer - Privacy