Zobrazeno 1 - 10
of 1 404
pro vyhledávání: '"Otway–Rees protocol"'
Publikováno v:
COMPLEXIS
Quantum Cryptography uses the counter-intuitive properties of Quantum Mechanics for performing cryptographic tasks in a secure and reliable way. The Quantum Key Distribution (QKD) protocol BB84 has been proven secure against several important types o
Publikováno v:
Computers & Security. 77:745-755
In this paper, a fast and efficient handover authentication protocol is proposed. It is considered as a solution to the performance problem of IEEE802.11s Wireless mesh networks (WMNs). Actually, it suffers from long handover delay time, which is uns
Autor:
Zhiwei Wang
Publikováno v:
Future Generation Computer Systems. 82:342-348
In large-scale Internet of Things (IoT) systems, huge volumes of data are collected from anywhere at any time, which may invade people’s privacy, especially when the systems are used in medical or daily living environments. Preserving privacy is an
Autor:
Yi Mu, Da-Zhi Sun
Publikováno v:
IEEE Wireless Communications Letters. 7:254-257
Liu et al. proposed a grouping-proof authentication protocol (GUPA) for distributed radio frequency identification systems. At the same time, Liu et al. claimed that GUPA can resist the well-known attacks such as replay, forgery, tracking, and denial
Publikováno v:
International Journal of Engineering, Science and Technology; Vol 5, No 4 (2013); 37-42
The mobile networks are experiencing a growing success. This success is mainly due to the fact that these networks providing the mobility of users, the transmission of data through open air and the requirement of low power. But, it is threatened by w
Publikováno v:
Future Generation Computer Systems. 80:483-495
In wireless medical sensor network (WMSN), bio-sensors are implanted within the patient body to sense the sensitive information of a patient which later on can be transmitted to the remote medical centers for further processing. The patients data can
Publikováno v:
Optical Fiber Technology. 40:18-27
The leakage of confidential information is one of important issues in the network security area. Elastic Optical Networks (EON) as a promising technology in the optical transport network is under threat from eavesdropping attacks. It is a great deman
Autor:
S. Meenakshi, Mary Subaja Christo
Publikováno v:
Computers & Electrical Engineering. 65:122-138
This research seeks is to investigate the Peer to Peer network topology and its custom behavior. The habitual effect of Peer to Peer network includes considering all the connected nodes as peers and these peers head-on with other peers to effectuate
Publikováno v:
IEEE Systems Journal. 11:2718-2725
Wireless sensor networks (WSNs) have been widely used, most notably in real-time traffic monitoring and military sensing and tracking. However, WSN applications could suffer from threats and endanger the applications if the suitable security issues a
Autor:
Behnam Bahrak, Hoda Jannati
Publikováno v:
International Journal of Critical Infrastructure Protection. 19:59-67
Cloud computing is a popular network access model for the transparent and ubiquitous sharing of services and computing resources among customers by service providers. In the critical infrastructure domain, cloud computing is used by governments for a