Results 11 to 20 of about 36,354 (259)

An Identity-Based Cross-Domain Authenticated Asymmetric Group Key Agreement

open access: yesInformation, 2021
Cross-domain authenticated asymmetric group key agreement allows group members in different domains to establish a secure group communication channel and the senders can be anyone.
Qingnan Chen   +4 more
doaj   +1 more source

A fuzzy-based trust evaluation framework for efficient privacy preservation and secure authentication in VANET

open access: yesJournal of Information and Telecommunication, 2022
The Vehicular Adhoc Network (VANET) is a newly added smart technique in vehicles to ensure safety and reduce time consumption. Even though it saves time and guarantees safe travel, security and privacy are the most difficult issues in the VANET. Moreover,
N. Jyothi, Rekha Patil
doaj   +1 more source

Practical Short Signature Batch Verification [PDF]

open access: yes, 2009
In many applications, it is desirable to work with signatures that are short, and yet where many messages from different signers be verified very quickly. RSA signatures satisfy the latter condition, but are generally thousands of bits in length. Recent developments in pairing-based cryptography produced a number of "short" signatures which provide ...
FERRARA, Anna Lisa   +3 more
openaire   +3 more sources

Authentication Protocols in Internet of Vehicles: Taxonomy, Analysis, and Challenges

open access: yesIEEE Access, 2020
Internet of Vehicles (IoV) is treated as an extension of Vehicle-to-Vehicle (V2V) communication network. IoV helps in enhancing driving aids with the help of vehicle Artificial Intelligence (AI) awareness of other vehicles and their actions.
Palak Bagga   +4 more
doaj   +1 more source

Failure Early Warning and Life Estimation Method of Batch Smart Meter

open access: yesZhongguo dianli, 2022
With the construction of smart grid, the number of smart meters has increased significantly. Based on the field reliability data, the maximum likelihood method is used to estimate the distribution parameters of batch smart meters, and a batch fault early
Youpeng HUANG   +5 more
doaj   +1 more source

Paillier-Based Data Aggregation and Stimulation Scheme in the Smart Grid [PDF]

open access: yesJisuanji gongcheng, 2021
To address the privacy disclosure issues in data aggregation and stimulation in smart grids,a Paillier-based data aggregation and stimulation scheme is proposed for smart grids.The scheme employs a super-increasing sequence to construct multidimensional ...
ZHU Song, WANG Huaqun
doaj   +1 more source

Anonymous Batch Authentication Scheme in Internet of Vehicles for WAVE Security Services [PDF]

open access: yesJisuanji kexue, 2023
As a typical representative of the Internet of Things,the Internet of Vehicles plays an important role in intelligent transportation,not only providing vehicles with a variety of online services,but also reducing the risk of accidents for drivers.However,
GUO Nan, SONG Xiaobo, ZHUANG Luyuan, ZHAO Cong
doaj   +1 more source

Strongly Secure Certificateless Signature Scheme Supporting Batch Verification [PDF]

open access: yesMathematical Problems in Engineering, 2014
We propose a strongly secure certificateless signature scheme supporting batch verification, which makes it possible for a verifier to verify a set of signatures more efficiently than verifying them one by one. In an identity‐based digital signature scheme, private key generator (PKG) knows each user′s signing key, so it can generate a signature which ...
Chun-I Fan, Pei-Hsiu Ho, Yi-Feng Tseng
openaire   +3 more sources

Group Testing and Batch Verification [PDF]

open access: yes, 2010
We observe that finding invalid signatures in batches of signatures that fail batch verification is an instance of the classical group testing problem. We survey relevant group testing techniques, and present and compare new sequential and parallel algorithms for finding invalid signatures based on group testing algorithms.
Gregory M. Zaverucha, Douglas R. Stinson
openaire   +1 more source

Doppelgänger spotting in biomedical gene expression data

open access: yesiScience, 2022
Summary: Doppelgänger effects (DEs) occur when samples exhibit chance similarities such that, when split across training and validation sets, inflates the trained machine learning (ML) model performance.
Li Rong Wang   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy