External Party

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 204 Experts worldwide ranked by ideXlab platform

Ashok Kumar Das - One of the best experts on this subject based on the ideXlab platform.

  • tcalas temporal credential based anonymous lightweight authentication scheme for internet of drones environment
    IEEE Transactions on Vehicular Technology, 2019
    Co-Authors: Jangirala Srinivas, Ashok Kumar Das, Neeraj Kumar, Joel J P C Rodrigues
    Abstract:

    A user (External Party) is interested in accessing the real-time data from some designated drones of a particular fly zone in the Internet of Drones (IoD) deployment. However, to provide this facility, the user needs to be authenticated by an accessed remote drone and vice-versa. After successful authentication both parties can establish a secret session key for the secure communication. To handle this important problem in IoD environment, we design a novel temporal credential based anonymous lightweight user authentication mechanism for IoD environment, called TCALAS. A detailed security analysis using formal security under the broadly applied real-or-random (ROR) model, formal security verification under the broadly used software verification tool, known as automated validation of internet security protocols and applications, and also informal security analysis reveal that TCALAS has the capability to resist various known attacks against passive/active adversary. In addition, a detailed comparative study has been conducted for TCALAS and other related schemes, and the study also reveals that TCALAS provides better security and functionality features, and lower costs in both computation and communication as compared to existing schemes.

  • secure signature based authenticated key establishment scheme for future iot applications
    IEEE Access, 2017
    Co-Authors: Sravani Challa, Ashok Kumar Das, Neeraj Kumar, Mohammad Wazid, Alavalapati Goutham Reddy, Eunjun Yoon, Keeyoung Yoo
    Abstract:

    Internet of Things (IoT) is a network of all devices that can be accessed through the Internet. These devices can be remotely accessed and controlled using existing network infrastructure, thus allowing a direct integration of computing systems with the physical world. This also reduces human involvement along with improving accuracy and efficiency, resulting in economic benefit. The devices in IoT facilitate the day-to-day life of people. However, the IoT has an enormous threat to security and privacy due to its heterogeneous and dynamic nature. Authentication is one of the most challenging security requirements in the IoT environment, where a user (External Party) can directly access information from the devices, provided the mutual authentication between user and devices happens. In this paper, we present a new signature-based authenticated key establishment scheme for the IoT environment. The proposed scheme is tested for security with the help of the widely used Burrows-Abadi–Needham logic, informal security analysis, and also the formal security verification using the broadly accepted automated validation of Internet security protocols and applications tool. The proposed scheme is also implemented using the widely accepted NS2 simulator, and the simulation results demonstrate the practicability of the scheme. Finally, the proposed scheme provides more functionality features, and its computational and communication costs are also comparable with other existing approaches.

  • a secure and effective biometric based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor
    International Journal of Communication Systems, 2017
    Co-Authors: Ashok Kumar Das
    Abstract:

    Summary User authentication is a prominent security requirement in wireless sensor networks (WSNs) for accessing the real-time data from the sensors directly by a legitimate user (External Party). Several user authentication schemes are proposed in the literature. However, most of them are either vulnerable to different known attacks or they are inefficient. Recently, Althobaiti et al. presented a biometric-based user authentication scheme for WSNs. Although their scheme is efficient in computation, in this paper, we first show that their scheme has several security pitfalls such as (i) it is not resilient against node capture attack; (ii) it is insecure against impersonation attack; and (iii) it is insecure against man-in-the-middle attack. We then aim to propose a novel biometric-based user authentication scheme suitable for WSNs in order to withstand the security pitfalls found in Althobaiti et al. scheme. We show through the rigorous security analysis that our scheme is secure and satisfies the desirable security requirements. Furthermore, the simulation results for the formal security verification using the most widely used and accepted Automated Validation of Internet Security Protocols and Applications tool indicate that our scheme is secure. Our scheme is also efficient compared with existing related schemes. Copyright © 2015 John Wiley & Sons, Ltd.

Martin Quinn - One of the best experts on this subject based on the ideXlab platform.

  • Interpreting management accounting rules: an initial study of public bodies
    Journal of Management Control, 2014
    Co-Authors: Julie Bertz, Martin Quinn
    Abstract:

    Much has been written on the potentially institutionalized nature of management accounting practices in the past decade or so. In particular, the interactions of rules and routines, over time, provide explanations for the stable or changing nature of management accounting. Recent work has focused more on the conceptual nature of routines in particular. This paper will focus on an organizational environment where rules are more prevalent and explore the role of rules in rules/routines interactions. Such studies focusing on rules are lacking in the extant literature. This paper provides some evidence from initial interviews at two Irish local authorities which have recently changed internal costing systems at the behest of central government. Management accounting rules were forced upon the local authority by an External Party (central government), and we explore how these rules were interpreted by actors, and thus can become routinized. This interpretation led us to examine the notions of formal versus informal rules. Based on the empirical evidence we propose a more detailed interaction of rules and routines which bring about potentially institutionalized management accounting practices than that proposed in extant literature.

Kiyoko Kamibeppu - One of the best experts on this subject based on the ideXlab platform.

  • randomized comparative study of child and caregiver responses to three software functions added to the japanese version of the electronic pediatric quality of life inventory epedsql questionnaire
    Journal of Patient-Reported Outcomes, 2020
    Co-Authors: Iori Sato, Mariko Sakka, Takafumi Soejima, Sachiko Kita, Kiyoko Kamibeppu
    Abstract:

    Patient-reported outcomes (PROs) refer to any report of the status of a patient’s health condition, health behavior, or experience with healthcare directly from the patient, without interpretation of the patient’s response by a clinician or any other External Party. While many PROs, such as the Pediatric Quality of Life Inventory (PedsQL), were originally administered in paper-and-pencil format, these are now available as electronic versions (ePROs). Although ePROs might well have used the same structure as their paper versions, we developed an alternate ePedsQL incorporating three software functions: 1) a non-forcing non-response alert, 2) a conditional question branch of the School Functioning Scale that only displays for (pre) school children, and 3) a vertical item-by-item display for small-screen devices. This report evaluated the effect of these functions on item non-response rate, survey completion time, and user experience. All surveys were conducted via the online/computer mode. We compared the dynamic format containing the three functions with the basic format in a randomized comparative study in 2803 children and 6289 caregivers in Japan. We found that the non-response alert lowered the item non-response rate (0.338% to 0.046%, t = − 4.411, p < 0.001 by generalized linear mixed model analysis). The conditional question branch had mixed effects on survey completion time depending on the respondents’ age. Surprisingly, respondents rated the vertical question display for handheld devices less legible than the matrix format. Further, multigroup structural equation modelling revealed that the same configuration for both formats showed an acceptable fit (CFI 0.933, RMSEA 0.060, SRMR 0.038) but the errors of observed variables were larger for the dynamic format than the basic format. We confirmed the robustness of the ePedsQL in different formats. The non-response rate of ePedsQL was very low even in the absence of an alert. The branch and item-by-item display were effective but unnecessary for all populations. Our findings further understanding of how humans respond to special software functions and different digital survey formats and provide new insight on how the three tested functions might be most successfully implemented.

  • Randomized comparative study of child and caregiver responses to three software functions added to the Japanese version of the electronic Pediatric Quality of Life Inventory (ePedsQL) questionnaire
    Journal of patient-reported outcomes, 2020
    Co-Authors: Iori Sato, Mariko Sakka, Takafumi Soejima, Sachiko Kita, Kiyoko Kamibeppu
    Abstract:

    Patient-reported outcomes (PROs) refer to any report of the status of a patient’s health condition, health behavior, or experience with healthcare directly from the patient, without interpretation of the patient’s response by a clinician or any other External Party. While many PROs, such as the Pediatric Quality of Life Inventory (PedsQL), were originally administered in paper-and-pencil format, these are now available as electronic versions (ePROs). Although ePROs might well have used the same structure as their paper versions, we developed an alternate ePedsQL incorporating three software functions: 1) a non-forcing non-response alert, 2) a conditional question branch of the School Functioning Scale that only displays for (pre) school children, and 3) a vertical item-by-item display for small-screen devices. This report evaluated the effect of these functions on item non-response rate, survey completion time, and user experience. All surveys were conducted via the online/computer mode. We compared the dynamic format containing the three functions with the basic format in a randomized comparative study in 2803 children and 6289 caregivers in Japan. We found that the non-response alert lowered the item non-response rate (0.338% to 0.046%, t = − 4.411, p 

Julie Bertz - One of the best experts on this subject based on the ideXlab platform.

  • Interpreting management accounting rules: an initial study of public bodies
    Journal of Management Control, 2014
    Co-Authors: Julie Bertz, Martin Quinn
    Abstract:

    Much has been written on the potentially institutionalized nature of management accounting practices in the past decade or so. In particular, the interactions of rules and routines, over time, provide explanations for the stable or changing nature of management accounting. Recent work has focused more on the conceptual nature of routines in particular. This paper will focus on an organizational environment where rules are more prevalent and explore the role of rules in rules/routines interactions. Such studies focusing on rules are lacking in the extant literature. This paper provides some evidence from initial interviews at two Irish local authorities which have recently changed internal costing systems at the behest of central government. Management accounting rules were forced upon the local authority by an External Party (central government), and we explore how these rules were interpreted by actors, and thus can become routinized. This interpretation led us to examine the notions of formal versus informal rules. Based on the empirical evidence we propose a more detailed interaction of rules and routines which bring about potentially institutionalized management accounting practices than that proposed in extant literature.

Keeyoung Yoo - One of the best experts on this subject based on the ideXlab platform.

  • secure signature based authenticated key establishment scheme for future iot applications
    IEEE Access, 2017
    Co-Authors: Sravani Challa, Ashok Kumar Das, Neeraj Kumar, Mohammad Wazid, Alavalapati Goutham Reddy, Eunjun Yoon, Keeyoung Yoo
    Abstract:

    Internet of Things (IoT) is a network of all devices that can be accessed through the Internet. These devices can be remotely accessed and controlled using existing network infrastructure, thus allowing a direct integration of computing systems with the physical world. This also reduces human involvement along with improving accuracy and efficiency, resulting in economic benefit. The devices in IoT facilitate the day-to-day life of people. However, the IoT has an enormous threat to security and privacy due to its heterogeneous and dynamic nature. Authentication is one of the most challenging security requirements in the IoT environment, where a user (External Party) can directly access information from the devices, provided the mutual authentication between user and devices happens. In this paper, we present a new signature-based authenticated key establishment scheme for the IoT environment. The proposed scheme is tested for security with the help of the widely used Burrows-Abadi–Needham logic, informal security analysis, and also the formal security verification using the broadly accepted automated validation of Internet security protocols and applications tool. The proposed scheme is also implemented using the widely accepted NS2 simulator, and the simulation results demonstrate the practicability of the scheme. Finally, the proposed scheme provides more functionality features, and its computational and communication costs are also comparable with other existing approaches.