Results 41 to 50 of about 632 (158)

Towards secure and resilient unmanned aerial vehicles swarm network based on blockchain

open access: yesIET Blockchain, Volume 4, Issue S1, Page 483-493, December 2024.
Abstract Blockchain, as an emerging technology, has found diverse applications in solving trust issues in multi‐party cooperation. The field of Unmanned Aerial Vehicle (UAV) swarm networks is no exception, as UAVs are susceptible to attacks from malicious counterparts due to limited computing and storage resources. In this paper, the authors present an
Xin Zhou, Lin Yang, Linru MA, Huasen He
wiley   +1 more source

Certificateless Proxy Re-encryption Scheme for Cloud Computing Security [PDF]

open access: yesJisuanji gongcheng, 2017
This paper researches Proxy Re-encryption(PRE) technology under the Certificateless Public Key Cryptography(CL-PKC),gives a formal definition and security model for certificateless PRE system and construct a new certificateless PRE scheme.The new scheme ...
ZHU Jun,CHEN Linlin,ZHU Xian,XIE Ling,WEI Wei
doaj   +1 more source

Quantum blockchain: Trends, technologies, and future directions

open access: yesIET Quantum Communication, Volume 5, Issue 4, Page 516-542, December 2024.
This article surveys the current state of blockchain technology, emphasising its security, authentication protocols, AI integration, and the emerging field of quantum blockchain. It highlights how quantum computing can enhance blockchain security and the necessity for quantum‐resistant designs to ensure the robustness of blockchain networks against ...
Manjula Gandhi S   +15 more
wiley   +1 more source

Hierarchical certificateless authenticated key agreement protocol

open access: yesTongxin xuebao, 2016
A hierarchical certificateless authenticated key agreement protocol was proposed, and the proposed protocol was proved secure in extended Canetti-Krawczyk (eCK) model, the security of the protocol was based on the computa-tional Diffie-Hellman assumption.
Hang SU, Jian-wei LIU, Rui TAO
doaj  

An Anti-Quantum E-Voting Protocol in Blockchain With Audit Function

open access: yesIEEE Access, 2019
As an important method of making democratic decisions, voting has always been a topic of social concern. Compared with the traditional, e-voting is widely used in various decision scenarios because of the convenience, easy to participate and low cost ...
Shiyao Gao   +4 more
doaj   +1 more source

Security-Mediated Certificateless Cryptography [PDF]

open access: yes, 2006
We introduce the notion of security-mediated certificateless (SMC) cryptography. This allows more lightweight versions of mediated cryptography while maintaining the ability for instantaneous revocation of keys. Moreover, our solutions avoid key escrow, which has been used in all previous mediated cryptography algorithms. We provide a model of security
Chow, Sherman   +2 more
openaire   +2 more sources

Enhancing offloading with cybersecurity in edge computing for digital twin‐driven patient monitoring

open access: yesIET Wireless Sensor Systems, Volume 14, Issue 6, Page 363-380, December 2024.
This study presents a novel Digital Twin (DT) framework for remote healthcare monitoring, integrating edge computing with robust cybersecurity measures to enhance patient care. By employing advanced encryption, threat prediction, and secure communication protocols, we demonstrate a substantial improvement in data transmission security and efficiency ...
Ahmed K. Jameil, Hamed Al‐Raweshidy
wiley   +1 more source

Scheme on user identity attribute preserving based on ring signcryption for cloud computing

open access: yesTongxin xuebao, 2014
Identity attribute leak as the most severe security threat of cloud computing,in order to solve this problem,a protection scheme of identity attributes based on ring signcryption was proposed.Focused on digital identity management in cloud service,which ...
Shuan-bao LI   +5 more
doaj  

Secure semi‐automated GDPR compliance service with restrictive fine‐grained access control

open access: yesSECURITY AND PRIVACY, Volume 7, Issue 6, November/December 2024.
Abstract Sharing personal data with service providers is a contentious issue that led to the birth of data regulations such as the EU General Data Protection Regulation (GDPR) and similar laws in the US. Complying with these regulations is a must for service providers.
Max Hashem Eiza   +3 more
wiley   +1 more source

FGDB‐MLPP: A fine‐grained data‐sharing scheme with blockchain based on multi‐level privacy protection

open access: yesIET Communications, Volume 18, Issue 4, Page 309-321, March 2024.
(1) A blockchain‐based efficient data‐sharing scheme is proposed, which employs the ciphertext policy attribute‐based encryption algorithm to enable fine‐grained sharing of data resources. (2) An anonymous identity authentication method based on ring signatures is proposed, which can effectively protect the user's identity privacy and transaction ...
Junyu Lin   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy