Articles with "multi server" as a keyword



Photo from wikipedia

Provable Identity Based User Authentication Scheme on ECC in Multi-server Environment

Sign Up to like & get
recommendations!
Published in 2017 at "Wireless Personal Communications"

DOI: 10.1007/s11277-017-3961-5

Abstract: With non-stop development of e-commerce and different internet-based applications’ demands, service providers include many physical servers scattering all over the world. If some users would like to use various services, they have to repeatedly register.… read more here.

Keywords: authentication; scheme; multi server; server environment ... See more keywords
Photo from wikipedia

Cryptanalysis and Extended Three-Factor Remote User Authentication Scheme in Multi-Server Environment

Sign Up to like & get
recommendations!
Published in 2017 at "Arabian Journal for Science and Engineering"

DOI: 10.1007/s13369-016-2341-x

Abstract: Recently, Wen et al. have developed three-factor authentication protocol for multi-server environment, claiming it to be resistant to several kinds of attacks. In this paper, we review Wen et al.’s protocol and find that it… read more here.

Keywords: multi server; server environment; authentication; three factor ... See more keywords
Photo by lensingmyworld from unsplash

Three-Factor-Based Confidentiality-Preserving Remote User Authentication Scheme in Multi-server Environment

Sign Up to like & get
recommendations!
Published in 2017 at "Arabian Journal for Science and Engineering"

DOI: 10.1007/s13369-017-2665-1

Abstract: Recently, Guo–Wen projected an improved authentication protocol in multi-server environment, proclaiming it to preserve user anonymity. However, the authors revisit Guo–Wen’s protocol and discover various malicious threats, i.e., (1) password guessing threat, (2) identity guessing… read more here.

Keywords: authentication; scheme; protocol; threat ... See more keywords

Retrial multi-server queuing system with PHF service time distribution as a model of a channel with unreliable transmission of information

Sign Up to like & get
recommendations!
Published in 2019 at "Applied Mathematical Modelling"

DOI: 10.1016/j.apm.2018.09.005

Abstract: Abstract A multi-server retrial queue with a Markovian arrival process, as well as possible customer non-persistency and unreliable operation of servers, is analysed. The service of a customer (transmission of information) consists of a random… read more here.

Keywords: system; server; customer; distribution ... See more keywords
Photo from wikipedia

A multi-server information-sharing environment for cross-party collaboration on a private cloud

Sign Up to like & get
recommendations!
Published in 2017 at "Automation in Construction"

DOI: 10.1016/j.autcon.2017.06.021

Abstract: Abstract Interoperability remains the key problem in multi-discipline collaboration based on building information modeling (BIM). Although various methods have been proposed to solve the technical issues of interoperability, such as data sharing and data consistency;… read more here.

Keywords: information; cross party; information sharing; collaboration ... See more keywords
Photo by littlegreeneyes from unsplash

A secure biometrics-based authentication key exchange protocol for multi-server TMIS using ECC

Sign Up to like & get
recommendations!
Published in 2018 at "Computer methods and programs in biomedicine"

DOI: 10.1016/j.cmpb.2018.07.008

Abstract: BACKGROUND AND OBJECTIVES Telecare Medicine Information System (TMIS) enables physicians to efficiently and conveniently make certain diagnoses and medical treatment for patients over the insecure public Internet. To ensure patients securely access to medicinal services,… read more here.

Keywords: multi server; biometrics; server tmis; authentication ... See more keywords
Photo from wikipedia

An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation

Sign Up to like & get
recommendations!
Published in 2020 at "Digital Communications and Networks"

DOI: 10.1016/j.dcan.2020.05.001

Abstract: Abstract During the past decade, rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices. Service providers have hosted multiple servers to ensure seamless online services… read more here.

Keywords: hash based; scheme; authenticated key; multi server ... See more keywords
Photo from wikipedia

A Privacy-Preserving RLWE-Based Remote Biometric Authentication Scheme for Single and Multi-Server Environments

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2933576

Abstract: Lwamo et al. recently proposed a robust and efficient remote single and multi-server biometric authentication scheme using smart card and RSA. The scheme is vulnerable to the smart card lost attacks; therefore, the scheme cannot… read more here.

Keywords: scheme; biometric authentication; multi; single multi ... See more keywords
Photo from wikipedia

Service Family Design Optimization Considering a Multi-Server Queue

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3068008

Abstract: Service firms not only need to develop differentiated services to meet the requirements of customers with various preferences, but also have to improve service flexibility and the efficiency of the service system. A service family… read more here.

Keywords: service family; multi server; family design; service ... See more keywords
Photo by mattykwong1 from unsplash

On the Interaction of Video Caching and Retrieving in Multi-Server Mobile-Edge Computing Systems

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Wireless Communications Letters"

DOI: 10.1109/lwc.2019.2921759

Abstract: Mobile-edge computing (MEC) could support edge caching and processing for video service, which essentially changes “cache and transmit” mechanism and provides another video retrieval mode. However, existing caching policies are usually inefficient, mainly due to… read more here.

Keywords: interaction video; video caching; caching retrieving; edge computing ... See more keywords
Photo by lensingmyworld from unsplash

Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2016.2616876

Abstract: Multi-server environment is the most common scenario for a large number of enterprise class applications. In this environment, user registration at each server is not recommended. Using multi-server authentication architecture, user can manage authentication to… read more here.

Keywords: chebyshev chaotic; authentication; scheme; multi server ... See more keywords