Filters








574,432 Hits in 3.2 sec

User Participation in Coproduction of Health Innovation: Proposal for a Synergy Project

Jens Nygren, Elena Zukauskaite, Niklas Westberg
2018 JMIR Research Protocols  
Objective: The fundamental objective of this project is to advance knowledge and methods of how user participation in the coproduction of health innovations can be applied in order to benefit users, industry  ...  This project concerns advancing knowledge, methods, and logic for user participation in coproduction of health innovations. Such advancement is vital for several reasons.  ...  Collectively, our proposed projects are likely to yield new knowledge of these challenges and how to tackle them from a holistic perspective, rather than from a segmented process of innovation.  ... 
doi:10.2196/resprot.9322 pmid:29743159 pmcid:PMC5966657 fatcat:54q55e6dwra7zgpabexcxrokny

A Proposed Waterpipe Emissions Topography Protocol Reflecting Natural Environment User Behaviour

Edward C. Hensel, Samantha Emma Sarles, Abdulaziz al-Olayan, A. Gary DiFrancesco, Shehan Jayasekera, Nathan C. Eddingsaas, Risa J. Robinson
2019 International Journal of Environmental Research and Public Health  
A waterpipe emissions topography protocol consisting of 13 flow conditions is proposed to reflect 93% of the observed range of puff flow rate, puff duration and puff volume with representative inter-puff  ...  Users provided demographic information and logged their product use to supplement electronic monitor data.  ...  Table 1 . 1 Proposed waterpipe emissions topography protocol flow conditions.  ... 
doi:10.3390/ijerph17010092 pmid:31877722 pmcid:PMC6981362 fatcat:42kl657rubeqdh6hq6iovz2dmy

Proactive SRV spectrum handoff protocol based on GCS scheme in cognitive radio adhoc network [article]

Morteza Mehrnoush, V. T. Vakili
2016 arXiv   pre-print
The proposed proactive spectrum handoff protocol is compared with the other proactive spectrum handoff protocols.  ...  Simulation results illustrate that the proposed protocol outperforms the other protocols regarding higher average throughput and lower average service time.  ...  Average throughput of the proposed protocol is, also, better than the two other protocols. In this paper, a novel proactive spectrum handoff protocol is proposed.  ... 
arXiv:1611.07020v1 fatcat:3spdrpfdnve45fnyobr5kfrgoq

Reducing Round Complexity of Byzantine Broadcast [article]

Linda Chen, Jun Wan
2020 IACR Cryptology ePrint Archive  
We also generalize our idea to the dishonest majority setting and achieve an improvement over existing protocols.  ...  In this paper, we present a Byzantine Broadcast protocol with expected 8 rounds under a static adversary and expected 10 rounds under an adaptive adversary.  ...  The proposal is determined in the same way as the static adversary protocol. • Round 2 (Propose): Every user u ∈ [n] signs and relays any proposal it received to all other users. • Elect: Every user u  ... 
dblp:journals/iacr/ChenW20 fatcat:n5degr3omrajzputvpxxn7kwiq

Opportunistic Contention-Based Feedback Protocol for Downlink OFDMA Systems with Mixed Traffic [chapter]

Rachod Patachaianand, Kumbesan Sandrasegaran, Huda Adibah Mohd Ramli, Riyaj Basukala
2009 Lecture Notes in Computer Science  
The proposed feedback protocol requires a fixed amount of resource to carry feedback from all RT users and some selected NRT users.  ...  For NRT users, the achievable sum rate of the proposed protocol when the number of users is moderate (20-50 users) approaches the ideal case when the channel quality of all users is known at the base station  ...  3 M = 5 Max Power Selection Proposed Protocol Tang's Protocol 0 100 200 300 400 500 #Users  ... 
doi:10.1007/978-3-642-10467-1_115 fatcat:ybm5y6a4yjepljto5fyr7trrga

Identity-based Authentication and Access Control in Wireless Sensor Networks

Abdullah Al-Mahmud, Matei Ciobanu Morogan
2012 International Journal of Computer Applications  
User revocation is also handled in this proposed protocol.  ...  In this paper, I propose an identity-based user authentication and access control protocol based on the Identity-Based Signature (IBS) scheme where the ECC (Elliptic Curve Cryptography) based digital signature  ...  PROPOSED PROTOCOL In this proposed protocol, user authentication and access control will present. This part will discuss with the protocol itself.  ... 
doi:10.5120/5602-7858 fatcat:c5bfebjdw5gizfmozmhfkrq3hu

An Efficient Authentication Scheme for Internet of Things

Jaafer Saraireh, Haya Joudeh
2021 International Journal of Communication Networks and Information Security  
with the other two protocols used for comparative purposes, with 33% increased the proposed protocol performance.  ...  The results indicate that the enhanced protocol has a positive effect on minimizing packet length and time performance in authenticating users having once obtained access to the visited location area compared  ...  The results reveal that the enhanced protocol has a positive effect on the time performance of authenticating users once they have obtained access to the visited location area (after their first log in  ... 
doi:10.54039/ijcnis.v13i3.3422 fatcat:qmwxpmsygvg3xkewnc2w3rwepi

Diffie-Hellman key distribution in wireless multi-way relay networks

Ronald Y. Chang, Sian-Jheng Lin, Wei-Ho Chung
2013 2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference  
Two efficient key exchange protocols are proposed.  ...  This paper considers the extension of the original two-party Diffie-Hellman protocol to multi-party key distribution in wireless multi-way relay networks where multiple users can only communicate with  ...  Comparison with the Protocols in [2] Here, we compare the proposed protocols with the group Diffie-Hellman protocols GDH.1 and GDH.2 proposed in [2] .  ... 
doi:10.1109/apsipa.2013.6694207 dblp:conf/apsipa/ChangLC13a fatcat:isk6putrrzdjjo3dzyho244onq

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

Lein Harn, Changlu Lin
2013 Zenodo  
Unlike most user authentication protocols that authenticate a single user each time, we propose a new type of authentication, called group authentication, that authenticates all users in a group at once  ...  The group authentication protocol allows users to reuse their tokens without compromising the security of tokens. In addition, the group authentication can protect the identity of each user.  ...  Unlike most user authentication protocols that authenticate a single user each time, our proposed protocol authenticates all users of a group at once.  ... 
doi:10.5281/zenodo.4113357 fatcat:2zhqyfazzfcxxiylnowflmmp34

An efficient group authentication for group communications [article]

Lein Harn, Changlu Lin
2013 arXiv   pre-print
Unlike most user authentication protocols that authenticate a single user each time, we propose a new type of authentication, called group authentication, that authenticates all users in a group at once  ...  The group authentication protocol allows users to reuse their tokens without compromising the security of tokens. In addition, the group authentication can protect the identity of each user.  ...  Unlike most user authentication protocols that authenticate a single user each time, our proposed protocol authenticates all users of a group at once.  ... 
arXiv:1306.1436v1 fatcat:lqoqscjjqjg2dimew5n36ikr7i

AN AUTHENTICATION FOR GROUP COMMUNICATIONS IN AD-HOC NETWORKS

Peter Akubo Alabi
2021 International journal for innovation education and research  
Unlike most user authentication protocols that authenticate a single user each time, we propose a new type of authentication, called group authentication that authenticates all users in a group at once  ...  The group authentication protocol allows users to reuse their tokens without compromising the security of tokens. In addition, the group authentication can protect the identity of each user.  ...  Unlike most user authentication protocols that authenticate a single user each time, our proposed protocol authenticates all users of a group at once.  ... 
doi:10.31686/ijier.vol9.iss2.2941 fatcat:r2ubtgl5sjg7hpn4q3fokfyvje

A Secure Dynamic Identity based Single Sign-On Authentication Protocol

Qingqi Pei, Jie Yu
2014 Journal of Software  
It is extremely hard for user to remember the different ID and password, so the single sign-on (SSO) system has been proposed to solve this problem.  ...  So we propose a secure dynamic identify based Single Sign-On authentication protocol using smart card.  ...  This proposed protocol is much more efficient and user friendly than the protocol proposed by Chang and Lee (2004) .  ... 
doi:10.4304/jsw.9.1.154-161 fatcat:lhaobizinzbldocicgwi7tw33i

Cryptanalysis Of Two-Factor Authenticated Key Exchange Protocol In Public Wireless Lans

Hyunseung Lee, Donghyun Choi, Yunho Lee, Dongho Won, Seungjoo Kim
2009 Zenodo  
In Public Wireless LANs(PWLANs), user anonymity is an essential issue. Recently, Juang et al. proposed an anonymous authentication and key exchange protocol using smart cards in PWLANs.  ...  s protocol is vulnerable to the stolen-verifier attack and does not satisfy user anonymity.  ...  However, in 2008, Juang et al. proved that the protocol proposed by Park et al. did not ensure the user anonymity and proposed a new protocol ensuring the user anonymity [15] .  ... 
doi:10.5281/zenodo.1073560 fatcat:wsgbbxkvfjgpdptru2plr7w5uq

Elliptic Curve Cryptography based Secure and Efficient Authentication Protocol for Smart Card Users

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Huang et al. proposed a scheme for user authentication with smart cards which uses the concept of the timestamp. In Huang et al.'  ...  In this article, advanced and secure smart card based authentication protocol using elliptic curve cryptography (ECC) is proposed.  ...  Elliptic Curve Cryptography based Secure and Efficient Authentication Protocol for Smart Card Users Table - I: Different Notations used in Proposed Protocol - Notations Meaning UA User S Server k shows  ... 
doi:10.35940/ijitee.a7115.129219 fatcat:6qtc5rkulrfqjl5d5juz3y3gb4

Password authenticated key exchange protocol for multi-server mobile networks based on Chebyshev chaotic map

Chien-Lung Hsu, Tzu-Wei Lin
2013 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)  
This paper proposes a password authenticated key exchange protocol for multi-server mobile networks based on Chebyshev chaotic map. Properties of the proposed protocol are given below.  ...  A password authenticated key exchange protocol can be used to authenticate user's legitimacy and establish a secure communication between a user and his logon server by using his friendly memorized password  ...  As a result, the proposed protocol can satisfy user anonymity on communication. VI.  ... 
doi:10.1109/percomw.2013.6529462 dblp:conf/percom/HsuL13 fatcat:z4zfmjtnbbhr3cerabmhddg3yi
« Previous Showing results 1 — 15 out of 574,432 results