نتایج جستجو برای: avispa

تعداد نتایج: 166  

Journal: :IEEE Access 2021

Car-sharing systems can solve various urban problems by providing shared vehicles to people and reducing the operation of personal vehicles. With development Internet Things, easily use a car through simple operations on their mobile devices. However, car-sharing system has security problems. Sensitive information, such as user’s identity, location access code, is transmitted public channel for...

Journal: :Applied sciences 2021

As the amount of data generated in various distributed environments is rapidly increasing, cloud servers and computing technologies are attracting considerable attention. However, server has privacy issues, including personal information requires help a Trusted Third Party (TTP) for sharing. because value increases, owner who produces must become subject In this study, we use key aggregate sear...

Journal: :Computers, materials & continua 2022

Nowadays, healthcare has become an important area for the Internet of Things (IoT) to automate facilities share and use patient data anytime anywhere with services. At present, host-based paradigm is used sharing accessing healthcare-related data. However, due location-dependent nature, it suffers from latency, mobility, security. For this purpose, Named Data Networking (NDN) been recommended a...

Journal: :Indonesian Journal of Electrical Engineering and Computer Science 2021

The internet of things (IoT) and cloud computing are evolving technologies in the information technology field. Merging pervasive IoT with is an innovative solution for better analytics decision-making. Deployed devices offload different types data to cloud, while converges infrastructure, links up servers, analyzes obtained from devices, reinforces processing power, offers huge storage capacit...

Journal: :Computers, materials & continua 2022

Internet of Things (IoT) has become widely used nowadays and tremendous increase in the number users raises its security requirements as well. The constraints on resources such low computational capabilities power demand lightweight cryptosystems. Conventional algorithms are not applicable IoT network communications because mentioned above. In this work, a novel efficient scheme for providing a...

Journal: :Iet Intelligent Transport Systems 2022

Unmanned Aerial Vehicle (UAV) integrated Heterogeneous Network (HetNet) is currently considered as one of the promising technologies. This technology helps in fulfilling high demands bandwidth, volume, and range per user needs. In this paper, work carried out by authors to assure security for users such a network incorporating an authentication-based known Identity based Scheme (IBA). The IBA i...

2016
Claudia Conesa Javier Ibáñez Civera Lucía Seguí Pedro Fito Nicolás Laguarda-Miró

Electrochemical impedance spectroscopy (EIS) has been used for monitoring the enzymatic pineapple waste hydrolysis process. The system employed consists of a device called Advanced Voltammetry, Impedance Spectroscopy & Potentiometry Analyzer (AVISPA) equipped with a specific software application and a stainless steel double needle electrode. EIS measurements were conducted at different sacc...

2018
Shuming Qiu Guoai Xu Haseeb Ahmad Yanhui Guo

The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe som...

2006
Paul Hankes Drielsma Sebastian Mödersheim Luca Viganò David A. Basin

In many network applications and services, agents that share no secure channel in advance may still wish to communicate securely with each other. In such settings, one often settles for achieving security goals weaker than authentication, such as sender invariance. Informally, sender invariance means that all messages that seem to come from the same source actually do, where the source can perh...

2011
David Basin Sebastian Mödersheim Luca Viganò

We introduce constraint differentiation, a new technique for reducing search when modelchecking security protocols. Our technique is based on eliminating certain kinds of redundancies that arise in the search space when using symbolic exploration methods, in particular methods that employ constraints to represent and manipulate possible messages from an active intruder. Formally, we prove that ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید