نتایج جستجو برای: group based handover authentication
تعداد نتایج: 3726165 فیلتر نتایج به سال:
the purpose of the present study was to investigate the effect of task-based instruction of vocabulary on the receptive and oral productive acquisition of english vocabulary and compare the results with those obtained from the traditional method. the method and procedure applied in this study was as follows: after the implementation of opt, a group of sixty female students were chosen. the stu...
abstract the present study was an attempt to investigate the effect of critical thinking on writing ability of 60 iranian intermediate efl learners studying at chenar language institute in khuzestan, iran. to this end, the participants of the study were selected based on their performance in an pet test, a cornell critical thinking test form x and a pre-test of writing. the participants un...
Junior Doctors working on the Orthopaedic wards at a district general hospital identified the lack of a formal weekend handover. The Royal Colleges,GMC and Foundation Programme curriculum all emphasise the importance of a safe and effective handover. Doctors found that the current system of using a written, paper-based handover was unreliable, un-legible, and inefficient. Baseline measurements ...
Intelligent Transportation System (ITS) demands secure communication in Vehicular Networks is that allows vehicles to communicate. Immense amount of research is going on both in academia and by industry. Frequent handovers are realized in vehicular communication because of the high speed of vehicles and hence there is always a requirement of secure and fast authentication for a seamless handove...
In this paper we discuss anonymity in context of group based anonymous authentication (GBAA). Methods for GBAA provide mechanisms such that a user is able to prove membership in a group U ′ ⊆ U of authorized users U to a verifier, whereas the verifier does not obtain any information on the actual identity of the authenticating user. They can be used in addition to anonymous communication channe...
The fifth generation wireless system (5G) is expected to handle an unpredictable number of heterogeneous connected devices and to guarantee at least the same level of security provided by the contemporary wireless standards, including the Authentication and Key Agreement (AKA) protocol. The current AKA protocol has not been designed to efficiently support a very large number of devices. Hence, ...
We propose an end-to-end security scheme for mobility enabled healthcare Internet of Things (IoT). The proposed scheme consists of (i) a secure and efficient end-user authentication and authorization architecture based on the certificate based DTLS handshake, (ii) secure end-to-end communication based on session resumption, and (iii) robust mobility based on interconnected smart gateways. The s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید