Provably secure dynamic ID-based anonymous two-factor authenticated key exchange protocol with extended security model

Q **e, DS Wong, G Wang, X Tan… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Authenticated key exchange (AKE) protocol allows a user and a server to authenticate each
other and generate a session key for the subsequent communications. With the rapid …

[HTML][HTML] Big data security & individual (psychological) resilience: A review of social media risks and lessons learned from Indonesia

A Abdillah, I Widianingsih, RA Buchari, H Nurasa - Array, 2024 - Elsevier
This research aims to reduce social media security risks and develop best practices to help
governments address social media security risks more effectively. This research begins by …

An extended simple power consumption model for selecting a server to perform computation type processes in digital ecosystems

T Enokido, A Aikebaier… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
In information systems, applications are required to be realized in the digital ecosystems,
high performance systems, and scalable systems. In these applications, a client first selects …

Comparative handover performance analysis of IPv6 mobility management protocols

JH Lee, JM Bonnin, I You… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
IPv6 mobility management is one of the most challenging research topics for enabling
mobility service in the forthcoming mobile wireless ecosystems. The Internet Engineering …

A bibliometric analysis on collaborative robots in Logistics 4.0 environments

G Atzeni, G Vignali, L Tebaldi, E Bottani - Procedia Computer Science, 2021 - Elsevier
Logistics activities were included in the wave of changes brought with the advent of the
fourth industrial revolution. Several applications can be recognized for several activities …

An integrated power consumption model for distributed systems

T Enokido, M Takizawa - IEEE Transactions on Industrial …, 2012 - ieeexplore.ieee.org
In order to realize green ecosocieties, the total electric power consumption of computers and
networks is required to be reduced. In applications on distributed systems, clients issue …

A novel bio-inspired approach for high-performance management in service-oriented networks

V Conti, C Militello, L Rundo… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Service-continuity in distributed computing can be enhanced by designing self-organized
systems, with a non-fixed structure, able to modify their structure and organization, as well as …

Novel anonymous authentication scheme using smart cards

JL Tsai, NW Lo, TC Wu - IEEE Transactions on Industrial …, 2012 - ieeexplore.ieee.org
Smart card based authentication scheme has been widely utilized for various transaction-
oriented services such as electronic currency exchange, social insurance payment and e …

Security analysis of a single sign-on mechanism for distributed computer networks

G Wang, J Yu, Q **e - IEEE Transactions on Industrial …, 2012 - ieeexplore.ieee.org
Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a
single credential to be authenticated by multiple service providers in a distributed computer …

Exploiting cloud and workflow patterns for the analysis of composite cloud services

F Amato, F Moscato - Future Generation Computer Systems, 2017 - Elsevier
The rapid increase in heterogeneity, scale and diversity of cloud resources and services
leads to a growing-up complexity in their management and control. The development of new …