With the evolution of information technologies, mobile devices (e.g., cell phone, personal digital assistant, and notebook PC) have swamped all domains of the active life. At anytime and anywhere, they are in research of service to satisfy their immediate needs. The services are remotely provided and implemented in sites that verify the legitimacy of the user over an insecure communication channel. The mechanism that authenticates remote user and allows legitimate users to access network services over insecure communication network is known by remote user authentication. Smart card-based authentication is one of the most widely used and practical solutions to remote user authentication. In this paper, we propose a smart card-based authentication scheme that aims to provide more functionality to resist well-known attacks. It provides both user anonymity and mutual authentication in simple and efficient mechanism that can be applicable to limited resources. This mechanism can be suitable to ubiquitous computing environments in which a variety of wireless mobile devices with limited power and computation capacity are deployed.
With the recent advances in communication technologies for low-power devices, pervasive computing environments (PCE) spread as new domains beyond legacy enterprise and personal computing. The intelligent home network environment is thing which invisible device that is not shown linked mutually through network so that user may use device always is been pervasive. Smart devices are interconnected and collaborate as a global distributed system to infuse intelligence into systems and processes. This kind of environment provides various smart services and makes consequently an offer of convenient, pleasant, and blessed lives to people. However, the risk is high as long as the offer is pleasant and convenient. In such context, security is still very fragile and there is often a violation of user privacy and service interference. For this, a special interest in ubiquitous network security is going up. Safety lies primarily in the authentication of users accessing the network. It guarantees that only legitimate users can login and access to services indoor the network. In this paper, we propose an anonymous authentication and access control scheme to secure the interaction between mobile users handling smart devices and smart services in PCEs. In an environment based on public key infrastructure (PKI) and Authentication, Authorization, and Accounting (AAA), the proposed authentication protocol combines both network authentication technique based on symmetric keys and single sign-on mechanisms. The authentication protocol is simple and secure, protects the privacy of user and aims to satisfy the security requirements.
Industrial waste generates a supplementary cost for companies which must, by the force of law, take in charge their wastes, whether by their own means or through outside services. Molecular sieves used in the sections of dehydratation of natural gas become waste as soon as they are saturated and there is no possibility of regeneration. As a matter of fact, those of type 4Å are used in GP1/Z complex in Algerian company Sonatrach. Within the scope of this work the proposition to valorize these industrial wastes is put forward in the light of a series of analyses and experiments with distilled and polluted water. In this work a path is opened for further research valorization of the type 4Å saturated molecular sieves, used in the gas industry. After a simple wash with distilled water, we have noticed with the naked eye that our sample had changed color from black to white gray. We have repeated the same physical magnetism test, which was positive. We have carried a heat treatment at 100• C to remove physiosorbed water and 350• C heat treatment to remove the pore water. The surface area and pH of point of zero charge (pHPZC) of used zeolite were calculated as 37.54 m 2 g −1 and 6, respectively. The surface area and the pH of point of zero charge(pH PZC) of unused zeolite were calculated as 6.965 m 2 g −1 and 7, respectively.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.