Results 1 to 10 of about 36,354 (259)
Improved blockchain-based ECDSA batch verification scheme
IntroductionBlockchain technology has attracted much attention due to its decentralization, transparency and security. Initially applied in the financial field, it has now expanded to various fields such as Internet of Things (IoT), electronic cash and ...
Guangfu Wu, Jiandong Zhou, Xiaoyan Fu
doaj +2 more sources
Efficient privacy protection scheme with batch verification in smart grid
Smart grids can establish two-way communication with users, collect their electricity consumption data and provide reasonable pricing, but fine-grained electricity consumption data leads to the leakage of user privacy.
Mingxiang Wang, Lei Zhang, Lei Zhang
doaj +2 more sources
Batch Verification of Short Signatures [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Camenisch, Jan +2 more
openaire +5 more sources
Valsci: an open-source, self-hostable literature review utility for automated large-batch scientific claim verification using large language models [PDF]
Background The exponential growth of scientific publications poses a formidable challenge for researchers seeking to validate emerging hypotheses or synthesize existing evidence.
Brice Edelman, Jeffrey Skolnick
doaj +2 more sources
Wireless sensor network (WSN) is an emerging topic in wireless communication where various sensor nodes are connected over the internet for data exchange.
Pankaj Kumar +2 more
doaj +1 more source
A Trusted Batch Authentication Mechanism Based on Tree for Power Internet of Things
Devices in power Internet of things need to be trusted measurement. However, the existing data processing architecture has problems such as excessive pressure in cloud platform, and the existing trusted measurement architecture also has problems such as ...
Baohua ZHAO +5 more
doaj +1 more source
Batch Hard Contrastive Loss and Its Application to Cross-View Gait Recognition
Biometric person authentication comprises two tasks: the identification task (i.e., one-to-many matching) and the verification task (i.e., one-to-one matching).
Mohamad Ammar Alsherfawi Aljazaerly +3 more
doaj +1 more source
A Lightweight BT-Based Authentication Scheme for Illegal Signatures Identification in VANETs
Research related to vehicular ad hoc networks (VANETs) has received significant attention in recent years. Despite all the advantages, the security and privacy in VANETs still become the main challenge that is widely open to discussion.
Eko Fajar Cahyadi, Min-Shiang Hwang
doaj +1 more source
Analysis of Error Impact for Batch Handover Authentication Protocols in Mobile Wireless Networks
The handover authentication protocol controls the access of multiple access points in a mobile wireless network (MWN). PairHand is a handover authentication protocol that uses identity-based public key cryptography based on bilinear pairing and provides ...
Younsoo Park, Ho-Hyun Park
doaj +1 more source
Recently, Vehicle Ad Hoc Networks (VANETs) have been increasingly developed in Intelligent Transportation Systems (ITSs). However, VANETs are vulnerable to security issues because of the open-medium nature of Vehicle-To-Vehicle (V2V) and Vehicle-To ...
Mahmood A. Al-Shareeda +4 more
doaj +1 more source

