نتایج جستجو برای: avispa

تعداد نتایج: 166  

2007
I Kucharewicz A Bodzenta - Lukaszyk W Szymanski B Mroczko M Szmitkowski

Antecedentes: La gravedad de la reacción tras una picadura de himenópteros se ha relacionado con la presencia de niveles elevados de triptasa sérica. El propósito del estudio fue cuantifi car los niveles basales de triptasa en pacientes con alergia al veneno de himenópteros e investigar la posible correlación entre estos niveles y la gravedad de la reacción a la picadura. Métodos: Participaron ...

Journal: :Annales des Télécommunications 2010
Omar Cheikhrouhou Maryline Laurent-Maknavicius Amin Ben Abdallah Maher Ben Jemaa

In the era of mobile and wireless networks, the growing complexity of end devices and the accentuated tendency towards miniaturization of them raise new security challenges. Authentication is a crucial concern in resource constrained environments, and despite the great number of existing EAP methods, as explained in the article, we are still in need for EAP methods tightly adapted to wireless e...

Journal: :I. J. Network Security 2016
Abhimanyu Kumar Sachin Tripathi

Secure group communication is an active area of research and its popularity is fuelled by the growing importance of group-oriented applications such as teleconferences, collaborative workspace, pay per-view etc. A number of group key agreement protocols have been proposed for these objectives. However most of the protocols have not considers the anonymity of the participants. Although in some a...

Journal: :Information 2017
Anup Kumar Maurya V. N. Sastry

To improve the quality of service and reduce the possibility of security attacks, a secure and efficient user authentication mechanism is required for Wireless Sensor Networks (WSNs) and the Internet of Things (IoT). Session key establishment between the sensor node and the user is also required for secure communication. In this paper, we perform the security analysis of A.K.Das’s user authenti...

Journal: :Computers & Electrical Engineering 2013
Qingfeng Cheng

The main goal of this paper is to analyze the security of a multiple-key agreement protocol and to show that this protocol is vulnerable to forgery attack. In order to address the security weakness, a new efficient multiple-key agreement protocol is proposed. The proposed protocol is based on bilinear pairings and utilizes a novel signature scheme without one-way hash functions. In contrast to ...

2016
Yanrong Lu Lixiang Li Hao Zhang Yixian Yang

User anonymity is one of the key security features of an authenticated key agreement especially for communicating messages via an insecure network. Owing to the better properties and higher performance of chaotic theory, the chaotic maps have been introduced into the security schemes, and hence numerous key agreement schemes have been put forward under chaotic-maps. Recently, Xie et al. release...

2014
Abhimanyu Kumar Sachin Tripathi

Secure group communication is an active area of research and its popularity is fuelled by the growing importance of group oriented internet applications such as voice & video conferences, pay per view, etc. Several groupware applications like video conferences, distributed computations, etc requires secure transmission while communicating over the Internet. For secure communication, the integri...

Journal: :Comput. J. 2015
Zoran Djuric Dragan Gasevic

In order to be considered secure, a payment system needs to address a number of security issues. Besides fundamental security requirements, like confidentiality, data integrity, authentication and non-repudiation, another important requirement for a secure payment system is fair exchange. Many existing payment protocols require that customers must pay for products before their delivery (in the ...

Journal: :IJCSA 2009
Antonio Muñoz Antonio Maña Daniel Serrano

Software agents represent a promising computing paradigm. They are an elegant technology to solve problems that can not be easily solved in other way. The Scientific Community has proved that the use of the software agents approach simplifies the solution of difierent type of traditional computing problems. A proof of this is that several important applications exist based on this technology. I...

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید