Authentication in Ubiquitous Networking

2015 ◽  
Vol 9 (3) ◽  
pp. 57-83
Author(s):  
Abdullah Mohammed Almuhaideb ◽  
Bala Srinivasan

Mobile authentication is an essential service to ensure the security of engaging parties in a ubiquitous wireless network environment. Several solutions have been proposed mainly based on both centralised and distributed authentication models to allow ubiquitous mobile access authentication; however, limitations still exist in these approaches, namely flexibility, security and performance issues and vulnerabilities. These shortcomings are influenced by the resource limitations of both wireless networks and the mobile devices together with inter-technology and inter-provider challenges. In this paper, the authors reviewed the major techniques in the field of ubiquitous mobile access authentication, which has attracted many researchers in the past decade. After investigating existing mobile authentication models and approaches, the common challenges are summarised to serve as the solution key requirements. The identified key solution requirements allow analysing and evaluating mobile authentication approaches.

2013 ◽  
Vol 2013 ◽  
pp. 1-11 ◽  
Author(s):  
Shin-Yan Chiou

Mobile authentication can be used to verify a mobile user’s identity. Normally this is accomplished through the use of logon passwords, but this can raise the secret-key agreement problem between entities. This issue can be resolved by using a public-key cryptosystem, but mobile devices have limited computation ability and battery capacity and a PKI is needed. In this paper, we propose an efficient, non-PKI, authenticated, and blind issued symmetric key protocol for mobile access control systems. An easy-to-deploy authentication and authenticated key agreement system is designed such that empowered mobile devices can directly authorize other mobile devices to exchange keys with the server upon authentication using a non-PKI system without trusted parties. Empowered mobile users do not know the key value of the other mobile devices, preventing users from impersonating other individuals. Also, for security considerations, this system can revoke specific keys or keys issued by a specific user. The scheme is secure, efficient, and feasible and can be implemented in existing environments.


2011 ◽  
Vol 36 (2) ◽  
pp. 102-116
Author(s):  
JEAN GRAHAM-JONES

This article probes some of the ‘catches’ in the universal application of the common-sense word ‘censorship’. To do so, it scrutinizes the application of the Spanish-language termcensurato theatre produced in Buenos Aires and its working-class suburbs in the past thirty-five years, under dictatorship as well as democracy, through the examination of specific cases of productions and plays classified as censored, self-censored, and/or counter-censorial. The article concludes by examining two plays whose writing pre-dates the last dictatorship but which are still considered illustrative of a certain kind of Argentinian censorship. Through these various examples drawn from Argentinian theatrical practice, the article exposes censorship as a problematic category when applied equally at all times.


Author(s):  
Zixuan Yue ◽  
Zefeng Li ◽  
Donghai Jin ◽  
Xingmin Gui

Abstract Through-flow methods are widely used in turbomachinery design and performance prediction due to its fast calculation. In the past, circumferentially-averaging through-flow methods tended to ignore circumferential fluctuation source term (CFST) in the governing equations, leading to an inaccurate result when blades showed a strong three-dimensional feature. To solve this problem, CFST needs to be properly modeled. In this paper, three-dimensional numerical simulation is conducted to find the area where CFST dominates. The influence of inlet Mach number, incidence, camber angles and sweep angle on the CFST in this area is analyzed. A model for CFST is constructed. Three-dimensional verification of this model suggests that within the common scope of use of aerospace compressor designing, this model shows a good accuracy.


2020 ◽  
Vol 16 (5) ◽  
pp. 685-707 ◽  
Author(s):  
Amna Batool ◽  
Farid Menaa ◽  
Bushra Uzair ◽  
Barkat Ali Khan ◽  
Bouzid Menaa

: The pace at which nanotheranostic technology for human disease is evolving has accelerated exponentially over the past five years. Nanotechnology is committed to utilizing the intrinsic properties of materials and structures at submicroscopic-scale measures. Indeed, there is generally a profound influence of reducing physical dimensions of particulates and devices on their physico-chemical characteristics, biological properties, and performance. The exploration of nature’s components to work effectively as nanoscaffolds or nanodevices represents a tremendous and growing interest in medicine for various applications (e.g., biosensing, tunable control and targeted drug release, tissue engineering). Several nanotheranostic approaches (i.e., diagnostic plus therapeutic using nanoscale) conferring unique features are constantly progressing and overcoming all the limitations of conventional medicines including specificity, efficacy, solubility, sensitivity, biodegradability, biocompatibility, stability, interactions at subcellular levels. : This review introduces two major aspects of nanotechnology as an innovative and challenging theranostic strategy or solution: (i) the most intriguing (bare and functionalized) nanomaterials with their respective advantages and drawbacks; (ii) the current and promising multifunctional “smart” nanodevices.


2020 ◽  
Vol 15 (7) ◽  
pp. 588-596
Author(s):  
Haibao Zhang ◽  
Guodong Zhu

Renal cell carcinoma (RCC) is one of the common urologic neoplasms, and its incidence has been increasing over the past several decades; however, its pathogenesis is still unknown up to now. Recent studies have found that in addition to tumor cells, other cells in the tumor microenvironment also affect the biological behavior of the tumor. Among them, macrophages exist in a large amount in tumor microenvironment, and they are generally considered to play a key role in promoting tumorigenesis. Therefore, we summarized the recent researches on macrophage in the invasiveness and progression of RCC in latest years, and we also introduced and discussed many studies about macrophage in RCC to promote angiogenesis by changing tumor microenvironment and inhibit immune response in order to activate tumor progression. Moreover, macrophage interactes with various cytokines to promote tumor proliferation, invasion and metastasis, and it also promotes tumor stem cell formation and induces drug resistance in the progression of RCC. The highlight of this review is to make a summary of the roles of macrophage in the invasion and progression of RCC; at the same time to raise some potential and possible targets for future RCC therapy.


2017 ◽  
Vol 7 (2) ◽  
pp. 7-25
Author(s):  
Karolina Diallo

Pupil with Obsessive-Compulsive Disorder. Over the past twenty years childhood OCD has received more attention than any other anxiety disorder that occurs in the childhood. The increasing interest and research in this area have led to increasing number of diagnoses of OCD in children and adolescents, which affects both specialists and teachers. Depending on the severity of symptoms OCD has a detrimental effect upon child's school performance, which can lead almost to the impossibility to concentrate on school and associated duties. This article is devoted to the obsessive-compulsive disorder and its specifics in children, focusing on the impact of this disorder on behaviour, experience and performance of the child in the school environment. It mentions how important is the role of the teacher in whose class the pupil with this diagnosis is and it points out that it is necessary to increase teachers' competence to identify children with OCD symptoms, to take the disease into the account, to adapt the course of teaching and to introduce such measures that could help children reduce the anxiety and maintain (or increase) the school performance within and in accordance with the school regulations and curriculum.


Author(s):  
Piero Ignazi

Chapter 1 introduces the long and difficult process of the theoretical legitimation of the political party as such. The analysis of the meaning and acceptance of ‘parties’ as tools of expressing contrasting visions moves forward from ancient Greece and Rome where (democratic) politics had first become a matter of speculation and practice, and ends up with the first cautious acceptance of parties by eighteenth-century British thinkers. The chapter explores how parties or factions have been constantly considered tools of division of the ‘common wealth’ and the ‘good society’. The holist and monist vision of a harmonious and compounded society, stigmatized parties and factions as an ultimate danger for the political community. Only when a new way of thinking, that is liberalism, emerged, was room for the acceptance of parties set.


Author(s):  
Deborah Tollefsen

When a group or institution issues a declarative statement, what sort of speech act is this? Is it the assertion of a single individual (perhaps the group’s spokesperson or leader) or the assertion of all or most of the group members? Or is there a sense in which the group itself asserts that p? If assertion is a speech act, then who is the actor in the case of group assertion? These are the questions this chapter aims to address. Whether groups themselves can make assertions or whether a group of individuals can jointly assert that p depends, in part, on what sort of speech act assertion is. The literature on assertion has burgeoned over the past few years, and there is a great deal of debate regarding the nature of assertion. John MacFarlane has helpfully identified four theories of assertion. Following Sandy Goldberg, we can call these the attitudinal account, the constitutive rule account, the common-ground account, and the commitment account. I shall consider what group assertion might look like under each of these accounts and doing so will help us to examine some of the accounts of group assertion (often presented as theories of group testimony) on offer. I shall argue that, of the four accounts, the commitment account can best be extended to make sense of group assertion in all its various forms.


2020 ◽  
Vol 15 ◽  
pp. 155892502097575
Author(s):  
Huiling Wang ◽  
Bin Zhou

Facial masks are beauty products which composed of a facial mask paper and beauty solution. Silk contains the amino acid structure closest to the human skin, and has the skin-friendly, cosmetic and antibacterial functions, but the common method for making nonwoven facial mask paper is not suitable for silk. In this paper, the silkworm’s spinning path is intervened manually to obtain a smart silk facial mask paper (SMC) of controllable thickness, so that the sericin on the silk fiber is well preserved. In the experiment where the SMC is compared with the nonwoven 384-cuprammonium rayon facial mask paper (CRMC) which is the most widely used in the market, it is found that the ways of forming the two facial mask paper are completely different, and therefore the morphologies under SEM are obviously different. The thickness of the SMC is 0.183 mm and the areal weight of it is 38.0 g/m2. It is very close to the CRMC (0.187 mm, 38.4 g/m2). The porosity of the SMC is 84.0%, which is slightly lower than that of the CRMC (86.3%), but its pores are well distributed. Compared with the CRMC, the smart SMC has higher dry and wet strength, lower elongation, slightly lower air permeability and liquid entrainment rate, and better antibacterial performance.


Sensors ◽  
2021 ◽  
Vol 21 (1) ◽  
pp. 229
Author(s):  
Xianzhong Tian ◽  
Juan Zhu ◽  
Ting Xu ◽  
Yanjun Li

The latest results in Deep Neural Networks (DNNs) have greatly improved the accuracy and performance of a variety of intelligent applications. However, running such computation-intensive DNN-based applications on resource-constrained mobile devices definitely leads to long latency and huge energy consumption. The traditional way is performing DNNs in the central cloud, but it requires significant amounts of data to be transferred to the cloud over the wireless network and also results in long latency. To solve this problem, offloading partial DNN computation to edge clouds has been proposed, to realize the collaborative execution between mobile devices and edge clouds. In addition, the mobility of mobile devices is easily to cause the computation offloading failure. In this paper, we develop a mobility-included DNN partition offloading algorithm (MDPO) to adapt to user’s mobility. The objective of MDPO is minimizing the total latency of completing a DNN job when the mobile user is moving. The MDPO algorithm is suitable for both DNNs with chain topology and graphic topology. We evaluate the performance of our proposed MDPO compared to local-only execution and edge-only execution, experiments show that MDPO significantly reduces the total latency and improves the performance of DNN, and MDPO can adjust well to different network conditions.


Sign in / Sign up

Export Citation Format

Share Document