Non-linear echo cancellation - a Bayesian approach [PDF]
Echo cancellation literature is reviewed, then a Bayesian model is introduced and it is shown how how it can be used to model and fit nonlinear channels. An algorithm for cancellation of echo over a nonlinear channel is developed and tested.
Addie, Ron, Braithwaite, Stephen
core +1 more source
A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks. [PDF]
Vehicular ad hoc networks (VANETs) provide a safer driving environment by allowing vehicles to broadcast safety related messages and inform neighbouring vehicles regarding traffic and road conditions.
Al-Riyami +11 more
core +1 more source
Certificateless Generalized Signcryption
AbstractGeneralized Signcryption is a fresh cryptographic primitive that not only can obtain encryption and signature in a single operation, but also provide encryption or signature model alone when needed. This paper proposed a formal definition of certificateless generalized signcryption(CLGSC), then provide the security model of CLGSC.
Ji, Huifang, Han, Wenbao, Zhao, Long
openaire +1 more source
An identity-based key infrastructure suitable for messaging applications [PDF]
—Identity-based encryption (IBE) systems are relatively recently proposed; yet they are highly popular for messaging applications since they offer new features such as certificateless infrastructure and anonymous communication. In this paper, we intended
Karatop, Ayse Gul +3 more
core +2 more sources
Biometric identity-based cryptography for e-Government environment [PDF]
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks.
Aljeaid, D, Langensiepen, C, Ma, X
core +1 more source
An Effective and Secure Key Management Protocol for Message Delivery in Autonomous Vehicular Clouds
Autonomous vehicular clouds, as the combination of cloud computing and conventional vehicular ad hoc networks, will provide abundant resources and services by sharing under-utilized resources of future high-end vehicles such as computing power, storage ...
Congcong Li +5 more
doaj +1 more source
Cryptanalysis and improvement of an efficient certificateless signature scheme
In traditional digital signature schemes, certificates signed by a trusted party are required to ensure the authenticity of the public key. In Asiacrypt 2003, the concept of certificateless signature scheme was introduced.
Huang, Xinyi, Li, Jiguo, Mu, Yi, Wu, Wei
core +1 more source
Exploratory study to explore the role of ICT in the process of knowledge management in an Indian business environment [PDF]
In the 21st century and the emergence of a digital economy, knowledge and the knowledge base economy are rapidly growing. To effectively be able to understand the processes involved in the creating, managing and sharing of knowledge management in the ...
Gururajan, Raj +3 more
core +2 more sources
Cryptanalysis of a Lightweight Certificateless Signature Scheme for IIOT Environments
As an extremely significant cryptographic primitive, certificateless signature (CLS) schemes can provide message authentication with no use of traditional digital certificates.
Bo Zhang +3 more
doaj +1 more source
Practical Certificateless Aggregate Signatures From Bilinear Maps [PDF]
Aggregate signature is a digital signature with a striking property that anyone can aggregate n individual signatures on n different messages which are signed by n distinct signers, into a single compact signature to reduce computational and storage ...
Chen, Kefei +3 more
core +4 more sources

