Results 21 to 30 of about 3,702 (204)
Certificateless cryptography does not require any certificate for the public key authentication and users' public keys are transmitted with ciphertext/signatures or by making them available in the IoT-based public directory in a proper way.
Kyung-Ah Shim
doaj +1 more source
RSA authentication mechanisms in control grid computing environment using Gridsim toolkit [PDF]
There are security concerns when our sensitive data is placed in the third party infrastructure such as in the Grid Computing environment. As such, it is difficult to be assured that our data is in the safe hands.Thus, authentication has become the most
Ismail, Saiful Adli +4 more
core +2 more sources
Reattack of a Certificateless Aggregate Signature Scheme with Constant Pairing Computations
A new attack against a novel certificateless aggregate signature scheme with constant pairing computations is presented. To enhance security, a new certificateless signature scheme is proposed first.
Hang Tu, Debiao He, Baojun Huang
doaj +1 more source
Lightweight certificateless and provably-secure signcryptosystem for the internet of things [PDF]
International audienceIn this paper, we propose an elliptic curve-based signcryption scheme derived from the standardized signature KCDSA (Korean Certificate-based Digital Signature Algorithm) in the context of the Internet of Things.
Laurent, Maryline +2 more
core +2 more sources
Novel lightweight signcryption-based key distribution mechanisms for MIKEY [PDF]
Part 1: Authentication and Key ManagementInternational audienceMultimedia Internet KEYing (MIKEY) is a standard key management protocol, used to set up common secrets between any two parties for multiple scenarios of communications.
Laurent, Maryline +2 more
core +3 more sources
Optimal coverage multi-path scheduling scheme with multiple mobile sinks for WSNs [PDF]
Wireless Sensor Networks (WSNs) are usually formed with many tiny sensors which are randomly deployed within sensing field for target monitoring. These sensors can transmit their monitored data to the sink in a multi-hop communication manner.
Gao, Yu +4 more
core +1 more source
With the fast development of Industrial Internet of Things (IIoT), IIoT storage, which provides a lower cost, higher reliability of data, remote access services, and expandable storage space, is received much attention among enterprises and individual ...
Tsu-Yang Wu +3 more
doaj +1 more source
Integrated Distributed Authentication Protocol for Smart Grid Communications [PDF]
In the smart grid, an integrated distributed authen- tication protocol is needed to not only securely manage the system but also efficiently authenticate many different entities for the communications.
Choi, B.J., Saxena, N.
core +3 more sources
Relations among notions of complete non-malleability: indistinguishability characterisation and efficient construction without random oracles [PDF]
We study relations among various notions of complete non-malleability, where an adversary can tamper with both ciphertexts and public-keys, and ciphertext indistinguishability.
Barbosa, Manuel, Farshim, Pooya
core +1 more source
Lattice-Based Revocable Certificateless Signature
Certificateless signatures (CLS) are noticeable because they may resolve the key escrow problem in ID-based signatures and break away the management problem regarding certificate in conventional signatures. However, the security of the mostly previous CLS schemes relies on the difficulty of solving discrete logarithm or large integer factorization ...
Hung, Ying-Hao +2 more
openaire +1 more source

