نتایج جستجو برای: avispa

تعداد نتایج: 166  

Journal: :Future Generation Computer Systems 2023

Federated Learning (FL) is a Machine (ML) technique that aims to reduce the threats user data privacy. Training done using raw on users’ devices, called clients. Only training results, gradients, are sent server be aggregated which used generate an updated model. However, we cannot assume can trusted with sensitive information, such as metadata related owner or source of data. So, hiding client...

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

Journal: :IEEE Access 2021

The Wireless Body Area Network (WBAN) plays a pivotal role in providing ubiquitous computing and has applications different fields, especially health monitoring. advancement wearable devices revolutionized the concept of medical services brought ease to our daily lives. However, latent threat imposed by attackers increased concerns related security privacy patient’s data due open nature wireles...

2011
Luu Anh Tuan Yang Liu Jin Song Dong Jun Sun

Security protocols play more and more important role with widely use in many applications nowadays. They are designed to provide security properties for users who wish to exchange messages over unsecured medium. There are many tools were designed to specify and verify security protocols such as Casper/FDR, ProVerif or AVISPA. While most of the existing tools focus on secrecy and authentication ...

2011
Luu Anh Tuan Jun Sun Yang Liu Jin Song Dong

Security protocols play more and more important role with widely use in many applications nowadays. They are designed to provide security properties for users who wish to exchange messages over unsecured medium. There are many tools were designed to specify and verify security protocols such as Casper/FDR, ProVerif or AVISPA. While most of the existing tools focus on secrecy and authentication ...

2013
Santanu Chatterjee Ashok Kumar Das Jamuna Kanta Sing

as: Chatt sity – Co Abstract Wireless body area networks (WBANs) can be applied to provide healthcare and patient monitoring. However, patient privacy can be vulnerable in a WBAN unless security is considered. Access to authorized users for the correct information and resources for different services can be provided with the help of efficient user access control mechanisms. This paper proposes ...

2014
Ashok Kumar Das Vanga Odelu Adrijit Goswami

In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes propo...

2016
Amin Mohammadali Mohammad Sayad Mohammad Hesam Tadayon

Security is fundamental to the operation of smart grid and its advanced metering infrastructure (AMI). Key establishment is the core component in key management schemes and plays a crucial role in satisfying the security requirements. In recent years, many key establishment protocols have been proposed in the context of smart grids. However, their high overhead and complexity have undermined th...

Journal: :CoRR 2015
Mauricio Toro

In this work we explain the implementation of event-driven real-time interpreters for the Concurrent Constraint Programming (CCP) and Non-deterministic Timed Concurrent Constraint (NTCC) formalisms. The CCP interpreter was tested with a program to find, concurrently, paths in a graph and it will be used in the future to find musical sequences in the music improvisation software Omax, developed ...

2010
LLANOS TOBARRA FERNANDO CUARTERO

In this paper, a formal analysis of a security protocol in the field of wireless sensor networks is presented. Sensor Network Encryption Protocol (SNEP) describes basic primitives for providing confidentiality, authentication between two nodes, data integrity and weak message freshness in a wireless sensor network. It was designed as the base component of Security Protocols for Sensor Networks ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید