Results 31 to 40 of about 2,279,222 (327)
UCAP:a PCL secure user authentication protocol in cloud computing
As the combine of cloud computing and Internet breeds many flexible IT services,cloud computing becomes more and more significant.In cloud computing,a user should be authenticated by a trusted third party or a certification authority before using cloud ...
Xuefeng LI, Junwei ZHANG, Jianfeng MA
doaj +2 more sources
A Survey on Key Agreement and Authentication Protocol for Internet of Things Application
The Internet of Things (IoT) represents a dynamic infrastructure, leveraging sensing and network communication technology to establish ubiquitous connectivity among people, machines, and objects.
M. Hasan +4 more
semanticscholar +1 more source
Secure and Efficient WBAN Authentication Protocols for Intra-BAN Tier
Telecare medical information system (TMIS) is a technology used in a wireless body area network (WBAN), which has a crucial role in healthcare services.
Abdullah M. Almuhaideb, Huda A. Alghamdi
doaj +1 more source
Verifying Authentication Protocol Implementations [PDF]
Formal methods for verifying authentication protocols tend to assume an idealised, perfect form of encryption. This approach has been spectacularly successful in finding flaws, but when we aim for proofs of correctness then we need to consider this assumption more carefully, and perhaps to weaken it to reflect properties of real cryptographic ...
openaire +3 more sources
Quantum authentication protocol
In this letter, we proposed a quantum authentication protocol. The authentication process is implemented by the symmetric cryptographic scheme with quantum effects.
Zeng, Guihua, Guo, Guangcan
openaire +2 more sources
Secure real-time data about goods in transit in supply chains needs bandwidth having capacity that is not fulfilled with the current infrastructure. Hence, 5G-enabled Internet of Things (IoT) in mobile edge computing is intended to substantially increase
Srinivas Jangirala, A. Das, A. Vasilakos
semanticscholar +1 more source
Enteropathogenic E. coli (EPEC) infects the human intestinal epithelium, resulting in severe illness and diarrhoea. In this study, we compared the infection of cancer‐derived cell lines with human organoid‐derived models of the small intestine. We observed a delayed in attachment, inflammation and cell death on primary cells, indicating that host ...
Mastura Neyazi +5 more
wiley +1 more source
A secure and private RFID authentication protocol based on quadratic residue [PDF]
Radio Frequency IDentification based systems are getting pervasively deployed in many real-life applications in various settings for identification and authentication of remote objects.
Kardaş, Süleyman +3 more
core
Hardware Implementation of the GPS authentication [PDF]
In this paper, we explore new area/throughput trade- offs for the Girault, Poupard and Stern authentication protocol (GPS). This authentication protocol was selected in the NESSIE competition and is even part of the standard ISO/IEC 9798. The originality
Dardaillon, Mickaël +2 more
core +4 more sources
Organoids in pediatric cancer research
Organoid technology has revolutionized cancer research, yet its application in pediatric oncology remains limited. Recent advances have enabled the development of pediatric tumor organoids, offering new insights into disease biology, treatment response, and interactions with the tumor microenvironment.
Carla Ríos Arceo, Jarno Drost
wiley +1 more source

