Provably secure dynamic ID-based anonymous two-factor authenticated key exchange protocol with extended security model
Authenticated key exchange (AKE) protocol allows a user and a server to authenticate each
other and generate a session key for the subsequent communications. With the rapid …
other and generate a session key for the subsequent communications. With the rapid …
[HTML][HTML] Big data security & individual (psychological) resilience: A review of social media risks and lessons learned from Indonesia
This research aims to reduce social media security risks and develop best practices to help
governments address social media security risks more effectively. This research begins by …
governments address social media security risks more effectively. This research begins by …
An extended simple power consumption model for selecting a server to perform computation type processes in digital ecosystems
T Enokido, A Aikebaier… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
In information systems, applications are required to be realized in the digital ecosystems,
high performance systems, and scalable systems. In these applications, a client first selects …
high performance systems, and scalable systems. In these applications, a client first selects …
Comparative handover performance analysis of IPv6 mobility management protocols
IPv6 mobility management is one of the most challenging research topics for enabling
mobility service in the forthcoming mobile wireless ecosystems. The Internet Engineering …
mobility service in the forthcoming mobile wireless ecosystems. The Internet Engineering …
A bibliometric analysis on collaborative robots in Logistics 4.0 environments
Logistics activities were included in the wave of changes brought with the advent of the
fourth industrial revolution. Several applications can be recognized for several activities …
fourth industrial revolution. Several applications can be recognized for several activities …
An integrated power consumption model for distributed systems
T Enokido, M Takizawa - IEEE Transactions on Industrial …, 2012 - ieeexplore.ieee.org
In order to realize green ecosocieties, the total electric power consumption of computers and
networks is required to be reduced. In applications on distributed systems, clients issue …
networks is required to be reduced. In applications on distributed systems, clients issue …
A novel bio-inspired approach for high-performance management in service-oriented networks
Service-continuity in distributed computing can be enhanced by designing self-organized
systems, with a non-fixed structure, able to modify their structure and organization, as well as …
systems, with a non-fixed structure, able to modify their structure and organization, as well as …
Novel anonymous authentication scheme using smart cards
JL Tsai, NW Lo, TC Wu - IEEE Transactions on Industrial …, 2012 - ieeexplore.ieee.org
Smart card based authentication scheme has been widely utilized for various transaction-
oriented services such as electronic currency exchange, social insurance payment and e …
oriented services such as electronic currency exchange, social insurance payment and e …
Security analysis of a single sign-on mechanism for distributed computer networks
Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a
single credential to be authenticated by multiple service providers in a distributed computer …
single credential to be authenticated by multiple service providers in a distributed computer …
Exploiting cloud and workflow patterns for the analysis of composite cloud services
The rapid increase in heterogeneity, scale and diversity of cloud resources and services
leads to a growing-up complexity in their management and control. The development of new …
leads to a growing-up complexity in their management and control. The development of new …