Results 71 to 80 of about 3,852 (258)

Privacy preserving mutual authentication in WiMAX

open access: yesInternational Journal of Information Technology, Communications and Convergence, 2013
A wireless network is more vulnerable than a wired network due to the broadcast nature of wireless medium. The nodes in a WiMAX network require authentication over this shared wireless channels. The existing EAP authentication mechanism requires multiple message exchanges and is not privacy preserving.
Brijesh Kumar Chaurasia, Shekhar Verma
openaire   +1 more source

All‐Optical Reconfigurable Physical Unclonable Function for Sustainable Security

open access: yesAdvanced Materials, EarlyView.
An all‐optical reconfigurable physical unclonable function (PUF) is demonstrated using plasmonic coupling–induced sintering of optically trapped gold nanoparticles, where Brownian motion serves as a robust entropy source. The resulting optical PUF exhibits high encoding density, strong resistance to modeling attacks, and practical authentication ...
Jang‐Kyun Kwak   +4 more
wiley   +1 more source

2PAKEP: Provably Secure and Efficient Two-Party Authenticated Key Exchange Protocol for Mobile Environment

open access: yesIEEE Access, 2018
With the increasing use of mobile devices, a secure communication and key exchange become the significant security issues in mobile environments. However, because of open network environments, mobile user can be vulnerable to various attacks.
Kisung Park   +3 more
doaj   +1 more source

Transducers Across Scales and Frequencies: A System‐Level Framework for Multiphysics Integration and Co‐Design

open access: yesAdvanced Materials Technologies, EarlyView.
Transducers convert physical signals into electrical and optical representations, yet each mechanism is bounded by intrinsic trade‐offs across bandwidth, sensitivity, speed, and energy. This review maps transduction mechanisms across physical scale and frequency, showing how heterogeneous integration and multiphysics co‐design transform isolated ...
Aolei Xu   +8 more
wiley   +1 more source

Secure and Efficient Authentication Protocol for Underwater Wireless Sensor Network Environments Using PUF

open access: yesApplied Sciences
Underwater wireless sensor networks (UWSNs) are increasingly used in marine monitoring and naval coastal surveillance, where limited bandwidth, long propagation delays, and physically exposed nodes make efficient authentication critical.
Jinsu Ahn, Deokkyu Kwon, Youngho Park
doaj   +1 more source

Mutual Authentication Scheme for IoT Application

open access: yesIndian Journal of Science and Technology, 2015
Background: Internet of Things (IoT) is the next emerging technique in which each and every thing in the world is getting connected to the internet by means of various communication techniques. By using the technique of multicasting, these things communicate with each other to transfer the data.
G. Usha Devi   +3 more
openaire   +1 more source

Predicting Macrophage Spatial Localization from Single‐Cell Transcriptomes to Uncover Disease Mechanisms

open access: yesAdvanced Science, EarlyView.
This study presents a machine‐learning framework entitled MERLIN that infers the microanatomical localization of macrophages from single‐cell transcriptomic data in structured organs such as the kidney and brain. Applying this method to existing datasets from models of acute kidney injury and diabetic nephropathy uncovered spatially resolved insights ...
Junping Yin   +18 more
wiley   +1 more source

Home - About - Disclaimer - Privacy