Public cloud computing provides a variety of services to consumersvia high-speed internet. The consumer can access these services anytimeand anywhere on a balanced service cost. Many traditional authenticationprotocol...
详细信息
Public cloud computing provides a variety of services to consumersvia high-speed internet. The consumer can access these services anytimeand anywhere on a balanced service cost. Many traditional authenticationprotocols are proposed to secure public cloud computing. However, therapid development of high-speed internet and organizations’ race to developquantum computers is a nightmare for existing authentication schemes. Thesetraditional authentication protocols are based on factorization or discretelogarithm problems. As a result, traditional authentication protocols arevulnerable in the quantum computing era. Therefore, in this article, we haveproposed an authentication protocol based on the lattice technique for publiccloud computing to resist quantum attacks and prevent all known traditionalsecurity attacks. The proposed lattice-based authentication protocolis provably secure under the Real-Or-Random (ROR) model. At the sametime, the result obtained during the experiments proved that our protocol islightweight compared to the existing lattice-based authentication protocols,as listed in the performance analysis section. The comparative analysis showsthat the protocol is suitable for practical implementation in a quantum-basedenvironment.
Blockchain technology is a game-changing technology that can completely overhaul number of domains by proposing decentralized, transparent, and unchangeable transaction ledgers. The purpose of this overview of the lit...
详细信息
Non-Orthogonal Multiplex Access(NOMA)can be deployed in Unmanned Aerial Vehicle(UAV)networks to improve spectrum *** to the broadcasting feature of NOMA-UAV networks,it is essential to focus on the security of the wir...
详细信息
Non-Orthogonal Multiplex Access(NOMA)can be deployed in Unmanned Aerial Vehicle(UAV)networks to improve spectrum *** to the broadcasting feature of NOMA-UAV networks,it is essential to focus on the security of the wireless *** paper focuses on maximizing the secrecy sum rate under the constraint of the achievable rate of the legitimate *** tackle the non-convexity optimization problem,a reinforcement learning-based alternative optimization algorithm is ***,with the help of successive convex approximations,the optimal power allocation scheme with a given UAV trajectory is obtained by using convex optimization ***,through plenty of explorations of the wireless environment,the Q-learning networks approach the optimal location transition strategy of the UAV,even without the wireless channel state information.
Collision free autonomous navigation is challenging area of interest for the shipping industry, and an accurately classifying the ships according to their size and type classes is a crucial undertaking in marine opera...
详细信息
The prediction of adverse drug reactions (ADRs) is paramount in mitigating risks to patient safety and enhancing pharmacovigilance efforts. While both machine learning (ML) and deep learning (DL) techniques have demon...
详细信息
A surgical treatment known as a bone marrow transplant (BMT) or hematopoietic stem cell transplant (HSCT) successfully treats bone marrow diseases. However, the treatment has a number of risk factors that may reduce l...
详细信息
Pneumonia is an infection that leads to inflammation and fluid accumulation within the pulmonary system. Pneumonia can be caused by bacterial, fungal or viral infection. Pneumonia causes breathing difficulties as the ...
详细信息
As more and more features are added to the car's Human- Machine Interface (HMI), device management becomes increasingly difficult. Making the most of the many human senses is consequently a tactic to facilitate us...
详细信息
Advancements in unmanned aerial vehicle (UAV) technology, along with indoor hybrid LiFi-WiFi networks (HLWN), promise the development of cost-effective, energy-efficient, adaptable, reliable, rapid, and on-demand HLWN...
详细信息
Segmentation of brain tumors aids in diagnosing the disease early, planning treatment, and monitoring its progression in medical image analysis. Automation is necessary to eliminate the time and variability associated...
详细信息
暂无评论