Showing 81 - 90 of 7,008
This article describes the deliberate making of a knowledge community to advance specialization in divided labor and structuring a successful enterprise. A knowledge network is characterized by mutual engagement in a joint enterprise that gives rise to a shared repertoire of knowledge,...
Persistent link: https://www.econbiz.de/10012047120
device, etc. Sensor data collection has wide issues of information security. Information security is also the current topic … wireless sensors so that a secure and efficient mutual authentication and authorization scheme is used in the smart grid … to overcome that attack, malicious user and device by authentication and authorization. The technique of authenticate …
Persistent link: https://www.econbiz.de/10012047569
inefficient authentication during the stage of proving credential possession. To overcome this drawback, this article presents a … achieve efficient authentication. In addition to providing a computational cost comparison table showing that the proposed … signature scheme achieves a more efficient credential possession proving compared to other schemes, concrete security proofs are …
Persistent link: https://www.econbiz.de/10012047815
reader’s signals. Along thisvein, a class of ultralightweight RFID authentication protocols has been designed,which uses only …, we analyze the security ofthe SASI protocol, a recently proposed ultralightweight RFID protocol with betterclaimed … security than earlier protocols. We show that SASI does not achieveresistance to tracking, which is one of its design …
Persistent link: https://www.econbiz.de/10009461313
(Class1). To protect users and organization we are proposing an enhanced RFID mutual authentication scheme. In this protocol … we use authentication based on shared unique parameters as a method to protect privacy. This protocol will be capable of … handling forward and backward security, rouge reader better than existing protocols. In our new scheme we involved RFID reader …
Persistent link: https://www.econbiz.de/10009483920
security. Recently, research proposed that an RFID tag can contain malicious code which might spread viruses, worms and other … ensure the data privacy of a tag. The framework will use a sanitization technique with a mutual authentication in the reader … stop execution of the code in the RFIF system. Here shared unique parameters are used for authentication. It will be …
Persistent link: https://www.econbiz.de/10009483982
Persistent link: https://www.econbiz.de/10003785975
Persistent link: https://www.econbiz.de/10003355602
Persistent link: https://www.econbiz.de/10011376429
Persistent link: https://www.econbiz.de/10011377276