• Aucun résultat trouvé

[PDF] Top 20 A Lightweight Mutual Authentication Protocol for the IoT

Has 10000 "A Lightweight Mutual Authentication Protocol for the IoT" found on our website. Below are the top 20 most common "A Lightweight Mutual Authentication Protocol for the IoT".

A Lightweight Mutual Authentication Protocol for the IoT

A Lightweight Mutual Authentication Protocol for the IoT

... evaluation For testing our authentication mechanism, we implemented our protocol in the OCARI stack software ...on the IEEE ...ensures a good signal transmission, that is ... Voir le document complet

11

Serverless lightweight mutual authentication protocol for small mobile computing devices

Serverless lightweight mutual authentication protocol for small mobile computing devices

... our protocol. AVISPA’s current version integrates four back-ends, On-the-fly Model-Checker (OFMC), Constraint-Logic-based Attack Searcher (CL-AtSe), SAT-based Model- Checker (SATMC), and Tree Automata based ... Voir le document complet

6

LATe: A Lightweight Authenticated Time Synchronization Protocol for IoT

LATe: A Lightweight Authenticated Time Synchronization Protocol for IoT

... HE A RT FOR S ECURE T IME S YNCHRONIZATION Prominent standardized time synchronization protocols are the IETF Network Time Protocol (NTP) [2], IEEE 1588 Precision-Time-Protocol (PTP), ... Voir le document complet

7

Lightweight serverless protocols for the internet of things

Lightweight serverless protocols for the internet of things

... Basically, the security protocols must meet the resource requirements for pervasive devices they are running ...protocols for pervasive systems with varying implementation choices suiting ... Voir le document complet

171

A lattice based authentication for low-cost RFID

A lattice based authentication for low-cost RFID

... NTRU for low-cost RFID tag, and a lightweight mutual authentication protocol based on this NTRU’s ...satisfies the security and privacy requirements for RFID ... Voir le document complet

7

Verification of two versions of the challenge handshake authentication protocol (CHAP)

Verification of two versions of the challenge handshake authentication protocol (CHAP)

... Introduction The Challenge Handshake Authentication Protocol, CHAP, is a protocol used to authenticate both ends of a communication ...Such authentication protocol ... Voir le document complet

19

A Trusted Lightweight Synchronisation Protocol for Wireless Ad-hoc Networks

A Trusted Lightweight Synchronisation Protocol for Wireless Ad-hoc Networks

... No authentication is used which is a crucial problem since in all approaches using trust aspects, a confidence level is associated to an ...identity. The last point is really important and in ... Voir le document complet

7

A Lightweight IoT Security Protocol

A Lightweight IoT Security Protocol

... propose a security protocol called HIP (Host Identity ...on the security of the constrained devices over LoWPAN (Low power Wire- less Personal Area ...on the asymmetric key ... Voir le document complet

9

Specification of a Collision-Free CSMA MAC Protocol for Wireless LANs: the CANlike protocol

Specification of a Collision-Free CSMA MAC Protocol for Wireless LANs: the CANlike protocol

... to the priority. The node that has the longest signal ...(i.e. the highest priority) wins the competition and then sends its ...frame. The drawback of this technique is that if ... Voir le document complet

6

A Lightweight Neural Model for Biomedical Entity Linking

A Lightweight Neural Model for Biomedical Entity Linking

... compare the performance of different ...on a single Intel(R) Xeon(R) Gold 6154 CPU @ ...by a 200-dimensional word embedding com- puted on the PubMed and MIMIC-III corpora (Zhang et ...As ... Voir le document complet

10

MUTUAL ORGANIZATIONS, MUTUAL SOCIETIES

MUTUAL ORGANIZATIONS, MUTUAL SOCIETIES

... of the population. The risks covered are illness, death and accident and also mutual help in case of social events such as marriages and funerals, proportionally much more expensive than in developed ... Voir le document complet

11

Mutual Organizations, Mutual Societies

Mutual Organizations, Mutual Societies

... L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignemen[r] ... Voir le document complet

10

A Unified Authentication Framework for Accessing Heterogeneous Web Services

A Unified Authentication Framework for Accessing Heterogeneous Web Services

... developed a system to emulate SSO in a hetero- geneous Web Services environment, freeing the end user from repeatedly entering service ...by the use case of composing multiple services, each ... Voir le document complet

8

Authentication optimization for seamless handovers

Authentication optimization for seamless handovers

... is a key concept in wireless, cellular- based ...when a mobile node changes its point of attachment to the network in order to meet an acceptable received signal strength ...to the procedures ... Voir le document complet

5

Designing a Framework for Smart IoT Adaptations

Designing a Framework for Smart IoT Adaptations

... Abstract. The Internet of Things (IoT) is the science of connecting multiple devices that coordinate to provide the service in ...question. IoT environments are complex, dynamic, ... Voir le document complet

11

Analysis of a distibuted algorithm for mutual exclusion

Analysis of a distibuted algorithm for mutual exclusion

... L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignemen[r] ... Voir le document complet

23

A text-independent speaker authentication system for mobile devices

A text-independent speaker authentication system for mobile devices

... on the results we have obtained in previous sections, it is possible for us to observe that the rate of correct identification remains consistent when our dataset is compared to the ones we ... Voir le document complet

22

A Lightweight Continuous Jobs Mechanism for MapReduce Frameworks

A Lightweight Continuous Jobs Mechanism for MapReduce Frameworks

... is a programming model which allows the processing of vast amounts of data in parallel, on a large number of ...since the execution time of a job is usually ...paper a generic ... Voir le document complet

9

SeMoM: a semantic middleware for IoT healthcare applications

SeMoM: a semantic middleware for IoT healthcare applications

... of the chapter ...propose a semantic IoT architecture to develop domain applica- tions able to exchange semantic ...From a semantic perspective, our objective is to provide a full ... Voir le document complet

186

A Language for Analyzing Security of IOT Systems

A Language for Analyzing Security of IOT Systems

... by the availability and data accuracy of the involved ...heterogeneity. A more adopted and popular security oriented modeling language for IoT system architecture is CySeMol ...model ... Voir le document complet

9

Show all 10000 documents...