Results 1 to 10 of about 36,354 (259)

Improved blockchain-based ECDSA batch verification scheme

open access: yesFrontiers in Blockchain
IntroductionBlockchain technology has attracted much attention due to its decentralization, transparency and security. Initially applied in the financial field, it has now expanded to various fields such as Internet of Things (IoT), electronic cash and ...
Guangfu Wu, Jiandong Zhou, Xiaoyan Fu
doaj   +2 more sources

Efficient privacy protection scheme with batch verification in smart grid

open access: yesFrontiers in Energy Research, 2023
Smart grids can establish two-way communication with users, collect their electricity consumption data and provide reasonable pricing, but fine-grained electricity consumption data leads to the leakage of user privacy.
Mingxiang Wang, Lei Zhang, Lei Zhang
doaj   +2 more sources

Batch Verification of Short Signatures [PDF]

open access: yesJournal of Cryptology, 2007
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Camenisch, Jan   +2 more
openaire   +5 more sources

Valsci: an open-source, self-hostable literature review utility for automated large-batch scientific claim verification using large language models [PDF]

open access: yesBMC Bioinformatics
Background The exponential growth of scientific publications poses a formidable challenge for researchers seeking to validate emerging hypotheses or synthesize existing evidence.
Brice Edelman, Jeffrey Skolnick
doaj   +2 more sources

Empirical Evaluation of ECC Batch Verification Algorithms of Digital Signature in Wireless Sensor Network

open access: yesElectronics, 2022
Wireless sensor network (WSN) is an emerging topic in wireless communication where various sensor nodes are connected over the internet for data exchange.
Pankaj Kumar   +2 more
doaj   +1 more source

A Trusted Batch Authentication Mechanism Based on Tree for Power Internet of Things

open access: yesZhongguo dianli, 2022
Devices in power Internet of things need to be trusted measurement. However, the existing data processing architecture has problems such as excessive pressure in cloud platform, and the existing trusted measurement architecture also has problems such as ...
Baohua ZHAO   +5 more
doaj   +1 more source

Batch Hard Contrastive Loss and Its Application to Cross-View Gait Recognition

open access: yesIEEE Access, 2023
Biometric person authentication comprises two tasks: the identification task (i.e., one-to-many matching) and the verification task (i.e., one-to-one matching).
Mohamad Ammar Alsherfawi Aljazaerly   +3 more
doaj   +1 more source

A Lightweight BT-Based Authentication Scheme for Illegal Signatures Identification in VANETs

open access: yesIEEE Access, 2022
Research related to vehicular ad hoc networks (VANETs) has received significant attention in recent years. Despite all the advantages, the security and privacy in VANETs still become the main challenge that is widely open to discussion.
Eko Fajar Cahyadi, Min-Shiang Hwang
doaj   +1 more source

Analysis of Error Impact for Batch Handover Authentication Protocols in Mobile Wireless Networks

open access: yesIEEE Access, 2020
The handover authentication protocol controls the access of multiple access points in a mobile wireless network (MWN). PairHand is a handover authentication protocol that uses identity-based public key cryptography based on bilinear pairing and provides ...
Younsoo Park, Ho-Hyun Park
doaj   +1 more source

LSWBVM: A Lightweight Security Without Using Batch Verification Method Scheme for a Vehicle Ad Hoc Network

open access: yesIEEE Access, 2020
Recently, Vehicle Ad Hoc Networks (VANETs) have been increasingly developed in Intelligent Transportation Systems (ITSs). However, VANETs are vulnerable to security issues because of the open-medium nature of Vehicle-To-Vehicle (V2V) and Vehicle-To ...
Mahmood A. Al-Shareeda   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy