期刊文献+
共找到1,023篇文章
< 1 2 52 >
每页显示 20 50 100
Call for Papers from Food Science of Animal Products
1
《食品科学》 EI CAS 北大核心 2025年第1期I0016-I0016,共1页
Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food mat... Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food materials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product fl avor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identifi cation;cell-cultured meat,regulations and standards. 展开更多
关键词 COOKING JOURNAL authentic
下载PDF
Call for Papers from Food Science of Animal Products
2
《食品科学》 EI CAS 北大核心 2025年第2期I0016-I0016,共1页
Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research findings in the field of animal-origin foods,involving food mater... Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research findings in the field of animal-origin foods,involving food materials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product flavor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identifi cation;cell-cultured meat,regulations and standards. 展开更多
关键词 COOKING JOURNAL authentic
下载PDF
Multi-Stage-Based Siamese Neural Network for Seal Image Recognition
3
作者 Jianfeng Lu Xiangye Huang +3 位作者 Caijin Li Renlin Xin Shanqing Zhang Mahmoud Emam 《Computer Modeling in Engineering & Sciences》 SCIE EI 2025年第1期405-423,共19页
Seal authentication is an important task for verifying the authenticity of stamped seals used in various domains to protect legal documents from tampering and counterfeiting.Stamped seal inspection is commonly audited... Seal authentication is an important task for verifying the authenticity of stamped seals used in various domains to protect legal documents from tampering and counterfeiting.Stamped seal inspection is commonly audited manually to ensure document authenticity.However,manual assessment of seal images is tedious and laborintensive due to human errors,inconsistent placement,and completeness of the seal.Traditional image recognition systems are inadequate enough to identify seal types accurately,necessitating a neural network-based method for seal image recognition.However,neural network-based classification algorithms,such as Residual Networks(ResNet)andVisualGeometryGroup with 16 layers(VGG16)yield suboptimal recognition rates on stamp datasets.Additionally,the fixed training data categories make handling new categories to be a challenging task.This paper proposes amulti-stage seal recognition algorithmbased on Siamese network to overcome these limitations.Firstly,the seal image is pre-processed by applying an image rotation correction module based on Histogram of Oriented Gradients(HOG).Secondly,the similarity between input seal image pairs is measured by utilizing a similarity comparison module based on the Siamese network.Finally,we compare the results with the pre-stored standard seal template images in the database to obtain the seal type.To evaluate the performance of the proposed method,we further create a new seal image dataset that contains two subsets with 210,000 valid labeled pairs in total.The proposed work has a practical significance in industries where automatic seal authentication is essential as in legal,financial,and governmental sectors,where automatic seal recognition can enhance document security and streamline validation processes.Furthermore,the experimental results show that the proposed multi-stage method for seal image recognition outperforms state-of-the-art methods on the two established datasets. 展开更多
关键词 Seal recognition seal authentication document tampering siamese network spatial transformer network similarity comparison network
下载PDF
Call for Papers from Food Science of Animal Products
4
《肉类研究》 北大核心 2025年第1期I0014-I0014,共1页
Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the 1atest research findings in the field of anima1-origin foobis,involving food mate... Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the 1atest research findings in the field of anima1-origin foobis,involving food matenials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product flavor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identification;cell-culured meat,regulations and standards. 展开更多
关键词 COOKING JOURNAL authentic
下载PDF
Call for Papers from Food Science of Animal Products
5
《食品科学》 北大核心 2025年第5期I0021-I0021,共1页
Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food mat... Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food materials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product fl avor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identifi cation;cell-cultured meat,regulations and standards. 展开更多
关键词 COOKING JOURNAL authentic
下载PDF
Authenticating GNSS civilian signals:a survey 被引量:5
6
作者 Muzi Yuan Xiaomei Tang Gang Ou 《Satellite Navigation》 EI CSCD 2023年第1期196-213,I0006,共19页
Civilian services of Global Navigation Satellite System are threatened by spoofng attacks since it is hard to determine the authenticity of a navigation signal with a detailed structure open to the public.Signal authe... Civilian services of Global Navigation Satellite System are threatened by spoofng attacks since it is hard to determine the authenticity of a navigation signal with a detailed structure open to the public.Signal authentication efectively protects the security of the signal by attaching unforgeable information to one or several elements of the signal.Receivers can verify the authenticity of the signal by extracting and validating this information.Developing good signal authentication schemes requires understanding possible spoofng modes,signal element specialty,and performance evaluation methods.This paper is an overview of navigation signal authentication,where the theories and reported approaches are described in detail.A design/performance matrix that demonstrates the advantages and defects of the signal element and its authentication design is summarized.Recommendations are proposed to improve the robustness,security,efciency,and implementation hardness for future designs of navigation signal authentication. 展开更多
关键词 GNSS spoofng Signal authentication Signal structure design Authentication scheme
原文传递
Secure approach to sharing digitized medical data in a cloud environment 被引量:1
7
作者 Kukatlapalli Pradeep Kumar Boppuru Rudra Prathap +2 位作者 Michael Moses Thiruthuvanathan Hari Murthy Vinay Jha Pillai 《Data Science and Management》 2024年第2期108-118,共11页
Without proper security mechanisms, medical records stored electronically can be accessed more easily than physical files. Patient health information is scattered throughout the hospital environment, including laborat... Without proper security mechanisms, medical records stored electronically can be accessed more easily than physical files. Patient health information is scattered throughout the hospital environment, including laboratories, pharmacies, and daily medical status reports. The electronic format of medical reports ensures that all information is available in a single place. However, it is difficult to store and manage large amounts of data. Dedicated servers and a data center are needed to store and manage patient data. However, self-managed data centers are expensive for hospitals. Storing data in a cloud is a cheaper alternative. The advantage of storing data in a cloud is that it can be retrieved anywhere and anytime using any device connected to the Internet. Therefore, doctors can easily access the medical history of a patient and diagnose diseases according to the context. It also helps prescribe the correct medicine to a patient in an appropriate way. The systematic storage of medical records could help reduce medical errors in hospitals. The challenge is to store medical records on a third-party cloud server while addressing privacy and security concerns. These servers are often semi-trusted. Thus, sensitive medical information must be protected. Open access to records and modifications performed on the information in those records may even cause patient fatalities. Patient-centric health-record security is a major concern. End-to-end file encryption before outsourcing data to a third-party cloud server ensures security. This paper presents a method that is a combination of the advanced encryption standard and the elliptical curve Diffie-Hellman method designed to increase the efficiency of medical record security for users. Comparisons of existing and proposed techniques are presented at the end of the article, with a focus on the analyzing the security approaches between the elliptic curve and secret-sharing methods. This study aims to provide a high level of security for patient health records. 展开更多
关键词 Electronic medical records Cloud computing Data privacy Attribute-based encryption AUTHENTICATION
下载PDF
T-ATMChain:Blockchain-Based Identity Authentication for Air Traffic Management
8
作者 Lu Xin Wu Zhijun Yue Meng 《China Communications》 SCIE CSCD 2024年第12期186-202,共17页
The air traffic management(ATM)system is an intelligent system,which integrates the ground computer network,airborne network and space satellite(communication and navigation)network by the ground-air data link system.... The air traffic management(ATM)system is an intelligent system,which integrates the ground computer network,airborne network and space satellite(communication and navigation)network by the ground-air data link system.Due to the openness and widely distribution of ATM system,the trust relationship of all parties in the system is pretty complex.At present,public key infrastructure(PKI)based identity authentication method is more and more difficult to meet the growing demand of ATM service.First,through the analysis of the organizational structure and operation mode of ATM system,this paper points out the existing identity authentication security threats in ATM system,and discusses the advantages of adopting blockchain technology in ATM system.Further,we briefly analyze some shortcomings of the current PKI-based authentication system in ATM.Particularly,to address the authentication problem,this paper proposes and presents a trusted ATM Security Authentication Model and authentication protocol based on blockchain.Finally,this paper makes a comprehensive analysis and simulation of the proposed security authentication scheme,and gets the expected effect. 展开更多
关键词 air traffic management blockchain identity authentication security authentication
下载PDF
Authenticated Digital Currency Redaction with Stronger Privacy and Usability
9
作者 Tang Yongli Li Ying +2 位作者 Zhao Zongqu Li Yuanhong Guo Rui 《China Communications》 SCIE CSCD 2024年第6期219-236,共18页
With the promotion of digital currency,how to effectively solve the authenticity,privacy and usability of digital currency issuance has been a key problem.Redactable signature scheme(RSS)can provide the verification o... With the promotion of digital currency,how to effectively solve the authenticity,privacy and usability of digital currency issuance has been a key problem.Redactable signature scheme(RSS)can provide the verification of the integrity and source of the generated sub-documents and solve the privacy problem in digital currency by removing blocks from the signed documents.Unfortunately,it has not realized the consolidation of signed documents,which can not solve the problem of merging two digital currencies.Now,we introduce the concept of weight based on the threshold secret sharing scheme(TSSS)and present a redactable signature scheme with merge algorithm(RSS-MA)using the quasi-commutative accumulator.Our scheme can reduce the communication overhead by utilizing the merge algorithm when transmitting multiple digital currency signatures.Furthermore,this can effectively hide the scale of users’private monetary assets and the number of transactions between users.While meeting the three properties of digital currency issuance,in order to ensure the availability of digital currency after redacting,editors shall not remove the relevant identification information block form digital currency.Finally,our security proof and the analysis of efficiency show that RSS-MA greatly improves the communication and computation efficiency when transmitting multiple signatures. 展开更多
关键词 authenticity verification digital currency privacy protection RSS-MA TSSS USABILITY
下载PDF
A Hybrid and Lightweight Device-to-Server Authentication Technique for the Internet of Things
10
作者 Shaha Al-Otaibi Rahim Khan +3 位作者 Hashim Ali Aftab Ahmed Khan Amir Saeed Jehad Ali 《Computers, Materials & Continua》 SCIE EI 2024年第3期3805-3823,共19页
The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective se... The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective server module.Although IoTs are cornerstones in different application domains,the device’s authenticity,i.e.,of server(s)and ordinary devices,is the most crucial issue and must be resolved on a priority basis.Therefore,various field-proven methodologies were presented to streamline the verification process of the communicating devices;however,location-aware authentication has not been reported as per our knowledge,which is a crucial metric,especially in scenarios where devices are mobile.This paper presents a lightweight and location-aware device-to-server authentication technique where the device’s membership with the nearest server is subjected to its location information along with other measures.Initially,Media Access Control(MAC)address and Advance Encryption Scheme(AES)along with a secret shared key,i.e.,λ_(i) of 128 bits,have been utilized by Trusted Authority(TA)to generate MaskIDs,which are used instead of the original ID,for every device,i.e.,server and member,and are shared in the offline phase.Secondly,TA shares a list of authentic devices,i.e.,server S_(j) and members C_(i),with every device in the IoT for the onward verification process,which is required to be executed before the initialization of the actual communication process.Additionally,every device should be located such that it lies within the coverage area of a server,and this location information is used in the authentication process.A thorough analytical analysis was carried out to check the susceptibility of the proposed and existing authentication approaches against well-known intruder attacks,i.e.,man-in-the-middle,masquerading,device,and server impersonations,etc.,especially in the IoT domain.Moreover,proposed authentication and existing state-of-the-art approaches have been simulated in the real environment of IoT to verify their performance,particularly in terms of various evaluation metrics,i.e.,processing,communication,and storage overheads.These results have verified the superiority of the proposed scheme against existing state-of-the-art approaches,preferably in terms of communication,storage,and processing costs. 展开更多
关键词 Internet of things AUTHENTICITY security LOCATION communication
下载PDF
Privacy Enhanced Mobile User Authentication Method Using Motion Sensors
11
作者 Chunlin Xiong Zhengqiu Weng +4 位作者 Jia Liu Liang Gu Fayez Alqahtani Amr Gafar Pradip Kumar Sharma 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期3013-3032,共20页
With the development of hardware devices and the upgrading of smartphones,a large number of users save privacy-related information in mobile devices,mainly smartphones,which puts forward higher demands on the protecti... With the development of hardware devices and the upgrading of smartphones,a large number of users save privacy-related information in mobile devices,mainly smartphones,which puts forward higher demands on the protection of mobile users’privacy information.At present,mobile user authenticationmethods based on humancomputer interaction have been extensively studied due to their advantages of high precision and non-perception,but there are still shortcomings such as low data collection efficiency,untrustworthy participating nodes,and lack of practicability.To this end,this paper proposes a privacy-enhanced mobile user authentication method with motion sensors,which mainly includes:(1)Construct a smart contract-based private chain and federated learning to improve the data collection efficiency of mobile user authentication,reduce the probability of the model being bypassed by attackers,and reduce the overhead of data centralized processing and the risk of privacy leakage;(2)Use certificateless encryption to realize the authentication of the device to ensure the credibility of the client nodes participating in the calculation;(3)Combine Variational Mode Decomposition(VMD)and Long Short-TermMemory(LSTM)to analyze and model the motion sensor data of mobile devices to improve the accuracy of model certification.The experimental results on the real environment dataset of 1513 people show that themethod proposed in this paper can effectively resist poisoning attacks while ensuring the accuracy and efficiency of mobile user authentication. 展开更多
关键词 Mobile authentication blockchain federated learning smart contract certificateless encryption VMD LSTM
下载PDF
Call for Papers from Food Science of Animal Products
12
《食品科学》 EI CAS CSCD 北大核心 2024年第24期I0016-I0016,共1页
Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food mat... Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food materials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product fl avor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identifi cation;cell-cultured meat,regulations and standards. 展开更多
关键词 COOKING JOURNAL authentic
下载PDF
Call for Papers from Food Science of Animal Products
13
《食品科学》 EI CAS CSCD 北大核心 2024年第16期I0016-I0016,共1页
Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food mat... Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food materials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product fl avor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identifi cation;cell-cultured meat,regulations and standards. 展开更多
关键词 COOKING JOURNAL authentic
下载PDF
Internet of Things Authentication Protocols: Comparative Study
14
作者 Souhayla Dargaoui Mourade Azrour +3 位作者 Ahmad ElAllaoui Azidine Guezzaz Abdulatif Alabdulatif Abdullah Alnajim 《Computers, Materials & Continua》 SCIE EI 2024年第4期65-91,共27页
Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is ... Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is still thebiggest challenge for its deployment. The main goal of IoT security is to ensure the accessibility of services providedby an IoT environment, protect privacy, and confidentiality, and guarantee the safety of IoT users, infrastructures,data, and devices. Authentication, as the first line of defense against security threats, becomes the priority ofeveryone. It can either grant or deny users access to resources according to their legitimacy. As a result, studyingand researching authentication issues within IoT is extremely important. As a result, studying and researchingauthentication issues within IoT is extremely important. This article presents a comparative study of recent researchin IoT security;it provides an analysis of recent authentication protocols from2019 to 2023 that cover several areaswithin IoT (such as smart cities, healthcare, and industry). This survey sought to provide an IoT security researchsummary, the biggest susceptibilities, and attacks, the appropriate technologies, and the most used simulators. Itillustrates that the resistance of protocols against attacks, and their computational and communication cost arelinked directly to the cryptography technique used to build it. Furthermore, it discusses the gaps in recent schemesand provides some future research directions. 展开更多
关键词 ATTACKS CRYPTOGRAPHY Internet of Things SECURITY AUTHENTICATION
下载PDF
Blockchain-Based Certificateless Cross-Domain Authentication Scheme in the Industrial Internet of Things
15
作者 Zhaobin Li Xiantao Liu +1 位作者 Nan Zhang Zhanzhen Wei 《Computers, Materials & Continua》 SCIE EI 2024年第9期3835-3854,共20页
The Industrial Internet of Things(IIoT)consists of massive devices in different management domains,and the lack of trust among cross-domain entities leads to risks of data security and privacy leakage during informati... The Industrial Internet of Things(IIoT)consists of massive devices in different management domains,and the lack of trust among cross-domain entities leads to risks of data security and privacy leakage during information exchange.To address the above challenges,a viable solution that combines Certificateless Public Key Cryptography(CL-PKC)with blockchain technology can be utilized.However,as many existing schemes rely on a single Key Generation Center(KGC),they are prone to problems such as single points of failure and high computational overhead.In this case,this paper proposes a novel blockchain-based certificateless cross-domain authentication scheme,that integrates the threshold secret sharing mechanism without a trusted center,meanwhile,adopts blockchain technology to enable cross-domain entities to authenticate with each other and to negotiate session keys securely.This scheme also supports the dynamic joining and removing of multiple KGCs,ensuring secure and efficient cross-domain authentication and key negotiation.Comparative analysiswith other protocols demonstrates that the proposed cross-domain authentication protocol can achieve high security with relatively lowcomputational overhead.Moreover,this paper evaluates the scheme based on Hyperledger Fabric blockchain environment and simulates the performance of the certificateless scheme under different threshold parameters,and the simulation results show that the scheme has high performance. 展开更多
关键词 IIoT blockchain CERTIFICATELESS cross-domain authentication
下载PDF
Call for Papers from Food Science of Animal Products
16
《食品科学》 EI CAS CSCD 北大核心 2024年第17期I0015-I0015,共1页
Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food mat... Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food materials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product fl avor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identifi cation;cell-cultured meat,regulations and standards. 展开更多
关键词 COOKING JOURNAL authentic
下载PDF
Call for Papers from Food Science of Animal Products
17
《食品科学》 EI CAS CSCD 北大核心 2024年第7期I0016-I0016,共1页
Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food mat... Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food materials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product fl avor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identifi cation;cell-cultured meat,regulations and standards. 展开更多
关键词 COOKING JOURNAL authentic
下载PDF
Call for Papers from Food Science of Animal Products
18
《食品科学》 EI CAS CSCD 北大核心 2024年第23期I0015-I0015,共1页
Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food mat... Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food materials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product fl avor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identifi cation;cell-cultured meat,regulations and standards. 展开更多
关键词 COOKING JOURNAL authentic
下载PDF
A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks
19
作者 Kumar Sekhar Roy Subhrajyoti Deb Hemanta Kumar Kalita 《Digital Communications and Networks》 SCIE CSCD 2024年第4期989-1000,共12页
The Internet of Things(IoT)has taken the interconnected world by storm.Due to their immense applicability,IoT devices are being scaled at exponential proportions worldwide.But,very little focus has been given to secur... The Internet of Things(IoT)has taken the interconnected world by storm.Due to their immense applicability,IoT devices are being scaled at exponential proportions worldwide.But,very little focus has been given to securing such devices.As these devices are constrained in numerous aspects,it leaves network designers and administrators with no choice but to deploy them with minimal or no security at all.We have seen distributed denial-ofservice attacks being raised using such devices during the infamous Mirai botnet attack in 2016.Therefore we propose a lightweight authentication protocol to provide proper access to such devices.We have considered several aspects while designing our authentication protocol,such as scalability,movement,user registration,device registration,etc.To define the architecture we used a three-layered model consisting of cloud,fog,and edge devices.We have also proposed several pre-existing cipher suites based on post-quantum cryptography for evaluation and usage.We also provide a fail-safe mechanism for a situation where an authenticating server might fail,and the deployed IoT devices can self-organize to keep providing services with no human intervention.We find that our protocol works the fastest when using ring learning with errors.We prove the safety of our authentication protocol using the automated validation of Internet security protocols and applications tool.In conclusion,we propose a safe,hybrid,and fast authentication protocol for authenticating IoT devices in a fog computing environment. 展开更多
关键词 Internet of things AUTHENTICATION Post-quantum cryptography Lattice-based cryptography Cloud computing Fog computing FAIL-SAFE
下载PDF
Call for Papers from Food Science of Animal Products
20
《食品科学》 EI CAS CSCD 北大核心 2024年第5期I0005-I0005,共1页
Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food mat... Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food materials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product fl avor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identifi cation;cell-cultured meat,regulations and standards. 展开更多
关键词 COOKING JOURNAL authentic
下载PDF
上一页 1 2 52 下一页 到第
使用帮助 返回顶部