Results 21 to 30 of about 253,734 (274)
A Forward-Secure Signature with Backward-Secure Detection [PDF]
In this paper, we propose a method to enhance the security of Abdalla and Reyzin 's forward-secure signature scheme, by producing a backward-secure detection. In the proposed scheme, we embedded the hash-chain into the forward-secure signature scheme. It achieves not only forward-security but also backward-security for the digital signature.
D.J. Guan, Dai-Rui Lin, Chih-I Wang
openaire +1 more source
A Lightweight Authentication Protocol for UAVs Based on ECC Scheme
With the rapid development of unmanned aerial vehicles (UAVs), often referred to as drones, their security issues are attracting more and more attention.
Shuo Zhang +3 more
doaj +1 more source
Secure Bilevel Asynchronous Vertical Federated Learning with Backward Updating
Vertical federated learning (VFL) attracts increasing attention due to the emerging demands of multi-party collaborative modeling and concerns of privacy leakage. In the real VFL applications, usually only one or partial parties hold labels, which makes it challenging for all parties to collaboratively learn the model without privacy leakage. Meanwhile,
Zhang, Qingsong +3 more
openaire +2 more sources
AES-LBBB: AES Mode for Lightweight and BBB-Secure Authenticated Encryption
In this paper, a new lightweight authenticated encryption scheme AESLBBB is proposed, which was designed to provide backward compatibility with advanced encryption standard (AES) as well as high security and low memory.
Yusuke Naito +2 more
doaj +1 more source
RFID Tag Group Ownership Transfer Protocol Satisfying Backward Security [PDF]
Most of tag ownership transfer protocols are only applicable to the single tag ownership transfer,and are not suitable for the tag group transfer at one time.To solve this problem,a Radio Frequency Identification(RFID) tag group ownership transfer ...
WEI Fang,ZOU Zhige
doaj +1 more source
An Improved and Secure RFID Group Tag Ownership Transfer Protocol [PDF]
Aiming at the security issues such as backward privacy leakage and violent cracking in the existing Radio Frequency Identification(RFID) group label ownership transfer protocol,an improved ownership transfer protocol is proposed.The word randomization ...
YIN Shoujun
doaj +1 more source
M-SSE: An Effective Searchable Symmetric Encryption With Enhanced Security for Mobile Devices
Searchable encryption allows mobile devices with limited computing and storage resources to outsource data to an untrusted cloud server. Users are able to search and retrieve the outsourced data; however, it suffers from information and privacy leakage ...
Chongzhi Gao +5 more
doaj +1 more source
Introduction. Out of Hidden India: Adivasi Histories, Stories, Visual Arts and Performances [PDF]
This issue of Anglistica AION is dedicated to indigenous India and to some of its forms of emerging subjectivity. After having been studied by ethnoanthropologists as cultural exceptions or worse after having embodied the stereotype of the ‘born ...
Ciocca, Rossella, DAS GUPTA, Sanjukta
core +1 more source
The widespread use of Unmanned Aerial Vehicles (UAV) has made the security and computing resource application efficiency of UAV a hot topic in the security field of the Internet of Things.
Yuan Lei +4 more
doaj +1 more source
Dynamic searchable symmetric encryption schemes with forward and backward security
Abstract Dynamic searchable symmetric encryption (DSSE) is helpful to users with limited storage. In DSSE, the users are able to perform search and update queries on the ciphertext which stored on the cloud server. However, DSSE may suffer from file-injection attacks and leak information after deletion.
Ke Huang +3 more
openaire +1 more source

