Results 11 to 20 of about 3,708 (115)

A Lightweight Stochastic Blockchain for IoT Data Integrity in Wireless Channels

open access: yesIEEE Open Journal of Vehicular Technology, 2023
Trustworthy validators selection is crucial as validators determine whether a block should be added to its chain. In this article, we proposed a novel confidence score-based lightweight stochastic blockchain for wireless Internet of Things (IoT) systems.
Sushila Dhaka   +3 more
doaj   +1 more source

Authentication of RSA via BAN logic

open access: yesJournal of Kufa for Mathematics and Computer, 2019
Web exchanges are conducted through an open network that lacks central management; it is, therefore, impossible to identify a communication partner, especially in a distributed system. Authentication is the basis of security in such systems.
Salah A. K. Albermany   +1 more
doaj   +1 more source

Design of Secure Mutual Authentication Scheme for Metaverse Environments Using Blockchain

open access: yesIEEE Access, 2022
During the COVID-19 pandemic, engagement in various remote activities such as online education and meetings has increased. However, since the conventional online environments typically provide simple streaming services using cameras and microphones ...
Jongseok Ryu   +4 more
doaj   +1 more source

Design of a Logistics System with Privacy and Lightweight Verification

open access: yesEnergies, 2019
Presently, E-commerce has developed rapidly as a result of many services and applications integrating e-commerce technologies offered online. Buyers can buy goods online and sellers can then deliver the goods to them.
Chin-Ling Chen   +4 more
doaj   +1 more source

A Secure Blockchain-Based Authentication and Key Agreement Scheme for 3GPP 5G Networks

open access: yesSensors, 2022
The futuristic fifth-generation cellular network (5G) not only supports high-speed internet, but must also connect a multitude of devices simultaneously without compromising network security.
Man Chun Chow, Maode Ma
doaj   +1 more source

A Secure Key Aggregate Searchable Encryption with Multi Delegation in Cloud Data Sharing Service

open access: yesApplied Sciences, 2021
As the amount of data generated in various distributed environments is rapidly increasing, cloud servers and computing technologies are attracting considerable attention.
JoonYoung Lee   +5 more
doaj   +1 more source

A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes

open access: yesSensors, 2021
With the information and communication technologies (ICT) and Internet of Things (IoT) gradually advancing, smart homes have been able to provide home services to users.
JiHyeon Oh   +5 more
doaj   +1 more source

Efficient Mobile RFID Authentication Protocol for Smart Logistics Targets Tracking

open access: yesIEEE Access, 2023
Target tracking is one of the problems existing in the supply chain management. The use of radio frequency identification (RFID) in target tracking helps improve the monitoring accuracy and status visibility of the tracked target. For mobile RFID system,
Cong Xu, Wenxue Wei, Shuangshuang Zheng
doaj   +1 more source

A Secure LEACH-PRO Protocol Based on Blockchain

open access: yesSensors, 2022
Wireless Sensor Networks (WSNs) are becoming more popular for many applications due to their convenient services. However, sensor nodes may suffer from significant security flaws, leading researchers to propose authentication schemes to protect WSNs ...
Ghada Sultan Aljumaie, Wajdi Alhakami
doaj   +1 more source

Robust Multiple Servers Architecture Based Authentication Scheme Preserving Anonymity

open access: yesSensors, 2019
Recently, many dynamic ID based remote user authentication schemes using smart card have been proposed to improve the security in multiple servers architecture authentication systems.
Huawei Wang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy