نتایج جستجو برای: multi server
تعداد نتایج: 511449 فیلتر نتایج به سال:
The main objective of this paper is to construct a distributed environment through which the economic load dispatch solutions of multi-area power systems can be monitored and controlled. A single-server/multi-client architecture which enables the neighboring power systems to access the remote economic load dispatch server (ELD) at any time with their respective data and to get the economic load...
Nowadays, multi-server remote user authentication schemes have been studied extensively in the literature. Recently, Chuang and Chen proposed a multi-server authentication scheme based on trust computing using smart cards and biometrics. Their scheme is more efficient and can achieve more security requirements than other related schemes. However, we found that Chuang and Chen’s scheme can discl...
An Improved Efficient Remote User Authentication Scheme in Multi-server Environment using Smart Card
In a single server environment, one server is responsible for providing services to all the authorized remote users. However, the problem arises if a user wishes to access several network services. To overcome this weakness, various multi-server authentication schemes have been proposed. In 2012, Taygi et al. [1] proposed a scheme for multi-server environment. But it is found that their propose...
Advancement in communication technology provides a scalable platform for various services where a remote user can access the server from anywhere without moving from its place. It has provided a unique opportunity for online services, such that the user need not physically present at the service center. These services adopt authentication and key agreement protocols to ensure authorized and sec...
In 2011, Lee et al. improved Hsiang et al.'s scheme and proposed a security dynamic ID-based remote user authentication scheme for multi-server environment using smart cards. They claimed that their protocol is efficient and can resist several kinds of known attacks. However, we observe that Lee et al.'s scheme is still vulnerable to stolen smart card attack, malicious server attack. To remedy ...
The submitting of OPC (OLE for Process Control) has promoted the progress of the data collection in process control and industrial automation, and formulated the industry standard for the process real-time data exchange. Aiming at the key problem of ensuring the use of application program as OPC client to link multi-remote OPC server and real-time collect process data in control system, OPC tec...
This paper deals with finite-population, single and multi-server queueing systems with two classes of vacation mechanisms : station vacation and server vacation. In the first one, all the servers take vacation simultaneously whenever the system becomes empty, and they also return to the system at the same time, i.e., station vacation is group vacation for all servers. For the second class of va...
This column examines and evaluates several techniques for developing multi-threaded servers. The server we’re examining mediates access to a stock quote database. Desktop client applications operated by investment brokers interact with our server to query stock prices. As with our previous columns, we’ll compare several ways to program multi-threaded quote servers using C, C++ wrappers, and CORBA.
This column examines and evaluates several techniques for developing multi-threaded servers. The server we’re examining mediates access to a stock quote database. Desktop client applications operated by investment brokers interact with our server to query stock prices. As with our previous columns, we’ll compare several ways to program multi-threaded quote servers using C, C++ wrappers, and CORBA.
According to advancements in the wireless technologies, study of biometrics-based multi-server authenticated key agreement schemes has acquired a lot of momentum. Recently, Wang et al. presented a three-factor authentication protocol with key agreement and claimed that their scheme was resistant to several prominent attacks. Unfortunately, this paper indicates that their protocol is still vulne...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید