Results 21 to 30 of about 3,708 (115)

A Robust Authentication Scheme for Multiple Servers Architecture

open access: yesIEEE Access, 2019
Multiple servers collaboration technology furnishes an effective storage management platform to the service providers. The massive data, which belong to disparate providers, possesses distinct access policies for each user.
Huawei Wang   +3 more
doaj   +1 more source

Chaotic Map-Based Authentication Protocol for Multiple Servers Architecture

open access: yesIEEE Access, 2019
Multiple servers collaboration technology is the foundation to realize cloud computing deployed in the distributed environments. Service providers could supply massive data and service to authorized users on the cloud infrastructure, instead of ...
Huawei Wang   +3 more
doaj   +1 more source

On the Design of Lightweight and Secure Mutual Authentication System for Global Roaming in Resource-Limited Mobility Networks

open access: yesIEEE Access, 2021
A secure authentication protocol plays a crucial role in securing communications over wireless and mobile networks. Due to resource-limitations and the nature of the wireless channel, the global mobile networks are highly susceptible to various attacks ...
R. Shashidhara   +3 more
doaj   +1 more source

An Efficient and Secure Key Agreement Protocol for Sharing Emergency Events in VANET Systems

open access: yesIEEE Access, 2019
With the recent rapid increase in the number of motor vehicles on roads, traffic accidents have increased, and emergency reporting processes have become essential. In this paper, a key agreement protocol for a real-time traffic sharing system is proposed
Chin-Ling Chen   +4 more
doaj   +1 more source

Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments

open access: yesSensors, 2023
Internet of Drones (IoD), designed to coordinate the access of unmanned aerial vehicles (UAVs), is a specific application of the Internet of Things (IoT).
Yohan Park   +3 more
doaj   +1 more source

Knowledge of Logic: Necessity or Refusal (Examining the Views and Reasons of Muslim Proponents and Opponents) [PDF]

open access: yesتاریخ فلسفه اسلامی
Knowledge of logic includes the rules that govern the way of thinking and reasoning. Muslims became familiar with this science in the third century by translating Aristotle's books and immediately faced the challenge of what does this science have to do ...
Ebrahim Noei
doaj   +1 more source

Cyberbullying and Empathy in the Age of Hyperconnection: An Interdisciplinary Approach

open access: yesFrontiers in Sociology, 2020
Considering cyberbullying as a challenging frontier of analysis in the social sciences, we find ourselves today with the duty to analyze it within a much broader social context. Indeed, we must take into account the logic of exclusion, as a fact.
Vincenzo Auriemma   +4 more
doaj   +1 more source

Design of Secure Handover Authentication Scheme for Urban Air Mobility Environments

open access: yesIEEE Access, 2022
Urban air mobility (UAM) is a future air transportation system to solve the air pollution and movement efficiency problems of the traditional mobility system.
Deokkyu Kwon   +6 more
doaj   +1 more source

A Secure RFID Delegation Authentication Scheme [PDF]

open access: yesJisuanji gongcheng, 2017
Aiming at the situation of delegation in smart home,a secure authentication scheme is proposed,which constructs authentication protocols for general scene and delegation scene based on Chebeshev chaotic mapping.Since the Chebeshev chaotic mapping owns ...
ZHOU Yousheng,LI Yuan
doaj   +1 more source

Provably Secure Multi-Server Authentication Protocol Using Fuzzy Commitment

open access: yesIEEE Access, 2018
Remote user authentication is a cryptographic mechanism through which a remote server verifies the legitimacy of an authorized user over an insecure communication channel.
Subhas Barman   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy