Results 21 to 30 of about 44,601 (278)
Threshold Anonymous Announcement in VANETs. [PDF]
Vehicular ad hoc networks (VANETs) allow wireless communications between vehicles without the aid of a central server. Reliable exchanges of information about road and traffic conditions allow a safer and more comfortable travelling environment. However,
Chen, LIqun, Ng, Siaw-Lynn, Wang, G.
core +2 more sources
Edge Computing-Based VANETs’ Anonymous Message Authentication
Vehicular Ad-hoc Networks (VANETs) have high requirements for real-time data processing and security of message authentication. In order to solve the computing power asymmetry between vehicles and road side units (RSUs) in VANETs under high-density traffic, accelerate the processing speed of message authentication, and solve the problems of high ...
Chengjun Yang +5 more
openaire +1 more source
Anonymous Authentication with Shared Secrets [PDF]
Anonymity and authenticity are both important yet often conflicting security goals in a wide range of applications. On the one hand for many applications (say for access control) it is crucial to be able to verify the identity of a given legitimate party (a.k.a. entity authentication).
Alwen Joel +4 more
openaire +1 more source
Anonymous authentication of membership in dynamic groups [PDF]
Thesis (S.B. and M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1999.Includes bibliographical references (leaves 34-36).by Todd C.
Parnell, Todd C., 1977-
core +2 more sources
Distributed anonymous authentication scheme based on the blockchain in VANET
Identity authentication is the first line of defense against malicious vehicles spreading false traffic information.However, due to the limited network bandwidth and computing power in the vehicle ad-hoc network (VANET), the existing schemes cannot meet ...
Xia FENG +3 more
doaj +2 more sources
InShopnito: an advanced yet privacy-friendly mobile shopping application [PDF]
Mobile Shopping Applications (MSAs) are rapidly gaining popularity. They enhance the shopping experience, by offering customized recommendations or incorporating customer loyalty programs. Although MSAs are quite effective at attracting new customers and
Boukayoua, Faysal +9 more
core +2 more sources
Threshold traceability anonymous authentication scheme without trusted center for ad hoc network
In order to provide anonymous authentication for ad hoc network,democratic group signatures with centerless secret sharing scheme and proposed a threshold traceability anonymous authentication scheme without trusted center for ad hoc network were ...
Fang-bin LIU +3 more
doaj +2 more sources
An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner.
Younsung Choi +5 more
doaj +1 more source
A Cloud-based RFID Authentication Protocol with Insecure Communication Channels [PDF]
© 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new ...
Alshehri, Awatif +2 more
core +2 more sources
Cross-domain Identity Authentication Scheme in Cloud Based on Certificateless Signature [PDF]
In view of the shortcoming of failure in cross-domain anonymous authentication scheme based on certificateless public key cryptography,a cross-domain authentication scheme in cloud environment is proposed by using bilinear mapping.On the basis of the ...
YANG Xiaodong,AN Faying,YANG Ping,LIU Tingting,WANG Caifen
doaj +1 more source

