Results 71 to 80 of about 3,852 (258)
Autonomous Mutual Authentication Protocol in the Edge Networks. [PDF]
Sheu RK, Pardeshi MS, Chen LC.
europepmc +1 more source
Privacy preserving mutual authentication in WiMAX
A wireless network is more vulnerable than a wired network due to the broadcast nature of wireless medium. The nodes in a WiMAX network require authentication over this shared wireless channels. The existing EAP authentication mechanism requires multiple message exchanges and is not privacy preserving.
Brijesh Kumar Chaurasia, Shekhar Verma
openaire +1 more source
All‐Optical Reconfigurable Physical Unclonable Function for Sustainable Security
An all‐optical reconfigurable physical unclonable function (PUF) is demonstrated using plasmonic coupling–induced sintering of optically trapped gold nanoparticles, where Brownian motion serves as a robust entropy source. The resulting optical PUF exhibits high encoding density, strong resistance to modeling attacks, and practical authentication ...
Jang‐Kyun Kwak +4 more
wiley +1 more source
With the increasing use of mobile devices, a secure communication and key exchange become the significant security issues in mobile environments. However, because of open network environments, mobile user can be vulnerable to various attacks.
Kisung Park +3 more
doaj +1 more source
MARAS: Mutual Authentication and Role-Based Authorization Scheme for Lightweight Internet of Things Applications. [PDF]
Şeker Ö, Dalkılıç G, Çabuk UC.
europepmc +1 more source
Transducers convert physical signals into electrical and optical representations, yet each mechanism is bounded by intrinsic trade‐offs across bandwidth, sensitivity, speed, and energy. This review maps transduction mechanisms across physical scale and frequency, showing how heterogeneous integration and multiphysics co‐design transform isolated ...
Aolei Xu +8 more
wiley +1 more source
Underwater wireless sensor networks (UWSNs) are increasingly used in marine monitoring and naval coastal surveillance, where limited bandwidth, long propagation delays, and physically exposed nodes make efficient authentication critical.
Jinsu Ahn, Deokkyu Kwon, Youngho Park
doaj +1 more source
Enhancing Security in ZigBee Wireless Sensor Networks: A New Approach and Mutual Authentication Scheme for D2D Communication. [PDF]
Allakany A +5 more
europepmc +1 more source
Mutual Authentication Scheme for IoT Application
Background: Internet of Things (IoT) is the next emerging technique in which each and every thing in the world is getting connected to the internet by means of various communication techniques. By using the technique of multicasting, these things communicate with each other to transfer the data.
G. Usha Devi +3 more
openaire +1 more source
This study presents a machine‐learning framework entitled MERLIN that infers the microanatomical localization of macrophages from single‐cell transcriptomic data in structured organs such as the kidney and brain. Applying this method to existing datasets from models of acute kidney injury and diabetic nephropathy uncovered spatially resolved insights ...
Junping Yin +18 more
wiley +1 more source

