نتایج جستجو برای: avispa
تعداد نتایج: 166 فیلتر نتایج به سال:
Optimization of resource consumption and decreasing the response time authentication requests is an immense urgent requirement for supporting scalability resources in IoT environments. The existing research attempts to design lightweight protocols address these issues. However, schemes proposed literature are lacking creation a (i.e., low computing, communication, storage cost) secure architect...
The implementation of efficient security mechanisms for Radio Frequency Identification (RFID) system has always been a continuous challenge due to its limited computing resources. Previously, hash-based, symmetric-key cryptography-based and elliptic curve cryptography based protocols were proposed RFID system. However, these are not suitable because some them failed fulfil the requirements, pro...
Recently, the Third Generation Partnership Project (3GPP) has initiated research in Fifth (5G) network to fulfill security characteristics of IoT-based services. 3GPP proposed 5G handover key structure and framework a recently published technical report. In this paper, we evaluate authentication mechanisms reported literature identify vulnerabilities such as violation global base-station attack...
Patients go to multiple healthcare providers for treatment, and their health data is generally distributed among providers. The the decentralized care system structure make it ideal blockchain-based information systems. authors consider referral use case; instance, a patient goes his primary Centre (PHC) treatment referred hospital. Authentication usually done using certificates or key cryptogr...
La investigación se desarrolló considerando la importancia que tienen los insectos perforadores de frutos y las grandes pérdidas en el guanábano Anona muricata, Caimito chrisophyllum zapote Matisia cordata zona Satipo. El trabajo consistió colección mensual conteo larvas por fruto durante todo año, para ello muestreo tuvo a tres lugares colección, tomando como muestra representativa 5 plantas g...
Wireless medical sensor networks (WMSNs), a type of wireless network (WSN), have enabled professionals to identify patients’ health information in real time and diagnose their conditions. However, since communication is performed through an open channel, attacker can steal or manipulate the transmitted received information. Because these attacks are directly related lives, it necessary prevent ...
Internet of Drones (IoD) is a framework to set up drones networks that may serve multiple purposes, e.g., data collection. New IoD applications (such as drone assisted internet vehicles) envision the simultaneous collection types. Although authentication prevent unauthorized users access collected data, existing solutions do not distinguish between different types by drones. Therefore, authenti...
Unmanned-aerial-vehicle (UAV)-enabled intelligent transportation system (ITS) is an advanced technology that can provide various services including autonomous driving, real-time creation of high-definition maps, and car sharing. In particular, a UAV-enabled ITS be realized through the combination traditional vehicular ad hoc networks (VANETs) UAVs act as flying roadside units (RSUs) at outskirt...
Secure ECC-Based Three-Factor Mutual Authentication Protocol for Telecare Medical Information System
In the recent COVID-19 situation, Telecare Medical Information System (TMIS) is attracting attention. TMIS one of technologies used in Wireless Body Area Network (WBAN) and can provide patients with a variety remote healthcare services. environments, sensitive data are communicated via an open channel. An adversary may attempt various security attacks including impersonation, replay, forgery at...
This paper proposes a Secure Mobile Wallet Framework (SMWF) using WPKI (Wireless Public Key Infrastructure) and UICC (Universal Integrated Circuit Card) by defining (a) a procedure of personalizing UICC by the client, (b) a procedure of provisioning and personalization (Mutual Authentication and Key Agreement Protocol) of Mobile Payments Application (which is on UICC) by the Bank and (c) our pr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید