Results 21 to 30 of about 44,601 (278)

Threshold Anonymous Announcement in VANETs. [PDF]

open access: yes, 2011
Vehicular ad hoc networks (VANETs) allow wireless communications between vehicles without the aid of a central server. Reliable exchanges of information about road and traffic conditions allow a safer and more comfortable travelling environment. However,
Chen, LIqun, Ng, Siaw-Lynn, Wang, G.
core   +2 more sources

Edge Computing-Based VANETs’ Anonymous Message Authentication

open access: yesSymmetry, 2022
Vehicular Ad-hoc Networks (VANETs) have high requirements for real-time data processing and security of message authentication. In order to solve the computing power asymmetry between vehicles and road side units (RSUs) in VANETs under high-density traffic, accelerate the processing speed of message authentication, and solve the problems of high ...
Chengjun Yang   +5 more
openaire   +1 more source

Anonymous Authentication with Shared Secrets [PDF]

open access: yes, 2015
Anonymity and authenticity are both important yet often conflicting security goals in a wide range of applications. On the one hand for many applications (say for access control) it is crucial to be able to verify the identity of a given legitimate party (a.k.a. entity authentication).
Alwen Joel   +4 more
openaire   +1 more source

Anonymous authentication of membership in dynamic groups [PDF]

open access: yes, 1999
Thesis (S.B. and M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1999.Includes bibliographical references (leaves 34-36).by Todd C.
Parnell, Todd C., 1977-
core   +2 more sources

Distributed anonymous authentication scheme based on the blockchain in VANET

open access: yesTongxin xuebao, 2022
Identity authentication is the first line of defense against malicious vehicles spreading false traffic information.However, due to the limited network bandwidth and computing power in the vehicle ad-hoc network (VANET), the existing schemes cannot meet ...
Xia FENG   +3 more
doaj   +2 more sources

InShopnito: an advanced yet privacy-friendly mobile shopping application [PDF]

open access: yes, 2014
Mobile Shopping Applications (MSAs) are rapidly gaining popularity. They enhance the shopping experience, by offering customized recommendations or incorporating customer loyalty programs. Although MSAs are quite effective at attracting new customers and
Boukayoua, Faysal   +9 more
core   +2 more sources

Threshold traceability anonymous authentication scheme without trusted center for ad hoc network

open access: yesTongxin xuebao, 2012
In order to provide anonymous authentication for ad hoc network,democratic group signatures with centerless secret sharing scheme and proposed a threshold traceability anonymous authentication scheme without trusted center for ad hoc network were ...
Fang-bin LIU   +3 more
doaj   +2 more sources

Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

open access: yesThe Scientific World Journal, 2014
An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner.
Younsung Choi   +5 more
doaj   +1 more source

A Cloud-based RFID Authentication Protocol with Insecure Communication Channels [PDF]

open access: yes, 2016
© 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new ...
Alshehri, Awatif   +2 more
core   +2 more sources

Cross-domain Identity Authentication Scheme in Cloud Based on Certificateless Signature [PDF]

open access: yesJisuanji gongcheng, 2017
In view of the shortcoming of failure in cross-domain anonymous authentication scheme based on certificateless public key cryptography,a cross-domain authentication scheme in cloud environment is proposed by using bilinear mapping.On the basis of the ...
YANG Xiaodong,AN Faying,YANG Ping,LIU Tingting,WANG Caifen
doaj   +1 more source

Home - About - Disclaimer - Privacy