نتایج جستجو برای: avispa
تعداد نتایج: 166 فیلتر نتایج به سال:
Car-sharing systems can solve various urban problems by providing shared vehicles to people and reducing the operation of personal vehicles. With development Internet Things, easily use a car through simple operations on their mobile devices. However, car-sharing system has security problems. Sensitive information, such as user’s identity, location access code, is transmitted public channel for...
As the amount of data generated in various distributed environments is rapidly increasing, cloud servers and computing technologies are attracting considerable attention. However, server has privacy issues, including personal information requires help a Trusted Third Party (TTP) for sharing. because value increases, owner who produces must become subject In this study, we use key aggregate sear...
Nowadays, healthcare has become an important area for the Internet of Things (IoT) to automate facilities share and use patient data anytime anywhere with services. At present, host-based paradigm is used sharing accessing healthcare-related data. However, due location-dependent nature, it suffers from latency, mobility, security. For this purpose, Named Data Networking (NDN) been recommended a...
The internet of things (IoT) and cloud computing are evolving technologies in the information technology field. Merging pervasive IoT with is an innovative solution for better analytics decision-making. Deployed devices offload different types data to cloud, while converges infrastructure, links up servers, analyzes obtained from devices, reinforces processing power, offers huge storage capacit...
Internet of Things (IoT) has become widely used nowadays and tremendous increase in the number users raises its security requirements as well. The constraints on resources such low computational capabilities power demand lightweight cryptosystems. Conventional algorithms are not applicable IoT network communications because mentioned above. In this work, a novel efficient scheme for providing a...
Unmanned Aerial Vehicle (UAV) integrated Heterogeneous Network (HetNet) is currently considered as one of the promising technologies. This technology helps in fulfilling high demands bandwidth, volume, and range per user needs. In this paper, work carried out by authors to assure security for users such a network incorporating an authentication-based known Identity based Scheme (IBA). The IBA i...
Electrochemical impedance spectroscopy (EIS) has been used for monitoring the enzymatic pineapple waste hydrolysis process. The system employed consists of a device called Advanced Voltammetry, Impedance Spectroscopy & Potentiometry Analyzer (AVISPA) equipped with a specific software application and a stainless steel double needle electrode. EIS measurements were conducted at different sacc...
The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe som...
In many network applications and services, agents that share no secure channel in advance may still wish to communicate securely with each other. In such settings, one often settles for achieving security goals weaker than authentication, such as sender invariance. Informally, sender invariance means that all messages that seem to come from the same source actually do, where the source can perh...
We introduce constraint differentiation, a new technique for reducing search when modelchecking security protocols. Our technique is based on eliminating certain kinds of redundancies that arise in the search space when using symbolic exploration methods, in particular methods that employ constraints to represent and manipulate possible messages from an active intruder. Formally, we prove that ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید