نتایج جستجو برای: avispa

تعداد نتایج: 166  

Journal: :Applied sciences 2021

Optimization of resource consumption and decreasing the response time authentication requests is an immense urgent requirement for supporting scalability resources in IoT environments. The existing research attempts to design lightweight protocols address these issues. However, schemes proposed literature are lacking creation a (i.e., low computing, communication, storage cost) secure architect...

Journal: :IEEE Access 2021

The implementation of efficient security mechanisms for Radio Frequency Identification (RFID) system has always been a continuous challenge due to its limited computing resources. Previously, hash-based, symmetric-key cryptography-based and elliptic curve cryptography based protocols were proposed RFID system. However, these are not suitable because some them failed fulfil the requirements, pro...

Journal: :Wireless Personal Communications 2021

Recently, the Third Generation Partnership Project (3GPP) has initiated research in Fifth (5G) network to fulfill security characteristics of IoT-based services. 3GPP proposed 5G handover key structure and framework a recently published technical report. In this paper, we evaluate authentication mechanisms reported literature identify vulnerabilities such as violation global base-station attack...

Journal: :IEEE Access 2022

Patients go to multiple healthcare providers for treatment, and their health data is generally distributed among providers. The the decentralized care system structure make it ideal blockchain-based information systems. authors consider referral use case; instance, a patient goes his primary Centre (PHC) treatment referred hospital. Authentication usually done using certificates or key cryptogr...

Journal: :Prospectiva universitaria 2022

La investigación se desarrolló considerando la importancia que tienen los insectos perforadores de frutos y las grandes pérdidas en el guanábano Anona muricata, Caimito chrisophyllum zapote Matisia cordata zona Satipo. El trabajo consistió colección mensual conteo larvas por fruto durante todo año, para ello muestreo tuvo a tres lugares colección, tomando como muestra representativa 5 plantas g...

Journal: :Electronics 2023

Wireless medical sensor networks (WMSNs), a type of wireless network (WSN), have enabled professionals to identify patients’ health information in real time and diagnose their conditions. However, since communication is performed through an open channel, attacker can steal or manipulate the transmitted received information. Because these attacks are directly related lives, it necessary prevent ...

Journal: :Computer Networks 2022

Internet of Drones (IoD) is a framework to set up drones networks that may serve multiple purposes, e.g., data collection. New IoD applications (such as drone assisted internet vehicles) envision the simultaneous collection types. Although authentication prevent unauthorized users access collected data, existing solutions do not distinguish between different types by drones. Therefore, authenti...

Journal: :IEEE Access 2023

Unmanned-aerial-vehicle (UAV)-enabled intelligent transportation system (ITS) is an advanced technology that can provide various services including autonomous driving, real-time creation of high-definition maps, and car sharing. In particular, a UAV-enabled ITS be realized through the combination traditional vehicular ad hoc networks (VANETs) UAVs act as flying roadside units (RSUs) at outskirt...

Journal: :IEEE Access 2022

In the recent COVID-19 situation, Telecare Medical Information System (TMIS) is attracting attention. TMIS one of technologies used in Wireless Body Area Network (WBAN) and can provide patients with a variety remote healthcare services. environments, sensitive data are communicated via an open channel. An adversary may attempt various security attacks including impersonation, replay, forgery at...

Journal: :IJAPUC 2012
Shaik Shakeel Ahamad V. N. Sastry Siba K. Udgata

This paper proposes a Secure Mobile Wallet Framework (SMWF) using WPKI (Wireless Public Key Infrastructure) and UICC (Universal Integrated Circuit Card) by defining (a) a procedure of personalizing UICC by the client, (b) a procedure of provisioning and personalization (Mutual Authentication and Key Agreement Protocol) of Mobile Payments Application (which is on UICC) by the Bank and (c) our pr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید