Results 21 to 30 of about 222 (168)

An Efficient Pairing‐Free Certificateless Signature Scheme with KGC Trust Level 3 for Wireless Sensor Network

open access: yesWireless Communications and Mobile Computing, Volume 2023, Issue 1, 2023., 2023
With the widespread adoption of wireless sensor networks (WSN), the security of the WSN has been a wide concern. Certificateless signature eliminates the certificate management problem and key escrow problem and is considered a feasible solution to solve the data integrity and authentication of WSN. Recently, Thumbur et al.
Hong Zhao   +4 more
wiley   +1 more source

Certificateless Aggregate Signature Scheme Based on No Pairing Mapping [PDF]

open access: yesJisuanji gongcheng, 2017
The security and reliability of the transmission of signals collected by the detection terminals and sensors of great importance in the high-rail track signal detection system.However,the relevant signal processing device is limited in computing power ...
ZUO Liming,ZHANG Tingting,GUO Hongli,CHEN Zuosong
doaj   +1 more source

A trust‐based mechanism for drones in smart cities

open access: yesIET Smart Cities, Volume 4, Issue 4, Page 255-264, December 2022., 2022
Abstract Smart cities equipped with intelligent devices can enhance the lifestyle and quality of humans by automatically and collaboratively acting as a sustainable resource to the ecosystem. In addition, the technological advancement can be further empowered by interconnecting various types of technologies, such as IoT, Artificial Intelligence, drones
Geetanjali Rathee   +3 more
wiley   +1 more source

Privacy‐preserving blockchain‐based authentication and trust management in VANETs

open access: yesIET Networks, Volume 11, Issue 3-4, Page 89-111, May-July 2022., 2022
Abstract Vehicular Ad Hoc Networks (VANETs) are characterized by high mobility of nodes and volatility, which make privacy, trust management, and security challenging issues in VANETs' design. In such networks, data can be exposed to a variety of attacks, the most dangerous is false information dissemination, which threatens the safety and efficiency ...
Waheeb Ahmed, Wu Di, Daniel Mukathe
wiley   +1 more source

A secure data transmission and efficient data balancing approach for 5G‐based IoT data using UUDIS‐ECC and LSRHS‐CNN algorithms

open access: yesIET Communications, Volume 16, Issue 5, Page 571-583, March 2022., 2022
Abstract Due to the realization of 5G technology, the Internet of things (IoT) has made remarkable advancements in recent years. However, security along with data balancing issues is proffered owing to IoT data's growth. The universally unique identifier short input pseudo‐random (SiP) hash‐based elliptic curve cryptography (UUDIS‐ECC) centred secure ...
Kusum Yadav   +6 more
wiley   +1 more source

Cryptanalysis of Two Signature Schemes for IoT-Based Mobile Payments and Healthcare Wireless Medical Sensor Networks

open access: yesIEEE Access, 2020
Certificateless cryptography does not require any certificate for the public key authentication and users' public keys are transmitted with ciphertext/signatures or by making them available in the IoT-based public directory in a proper way.
Kyung-Ah Shim
doaj   +1 more source

[Retracted] An Anonymous Signature‐Based Authentication and Key Agreement Scheme for Vehicular Ad Hoc Networks

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
Anonymous authentication is a critical step in safeguarding vehicle privacy and security in VANETs. VANETs connected with blockchain are gaining popularity as a means to increase the effectiveness of anonymous authentication across many security domains.
Azees M   +3 more
wiley   +1 more source

Public Integrity Auditing of Shared Encrypted Data within Cloud Storage Group

open access: yesWireless Communications and Mobile Computing, Volume 2022, Issue 1, 2022., 2022
The pandemic of COVID‐19 has posed a severe challenge to the traditional on‐site centralized development projects; people therefore have to share data in a group by the cloud storage server and develop projects at home. The cloud server is untrustworthy, although it supplies the powerful computing capability and abundant storage space; so far wide ...
Chunxia Han, Linjie Wang, Yingjie Wang
wiley   +1 more source

[Retracted] Identity‐Based Designated‐Verifier Proxy Signature Scheme with Information Recovery in Telemedicine System

open access: yesWireless Communications and Mobile Computing, Volume 2022, Issue 1, 2022., 2022
With the promotion of Remote Medical Treatment, the sharing of big telemedicine data becomes more and more popular. Telemedicine based on wireless sensor networks collects blood pressure, pH value, pulse, and other medical information from the telemedicine healthcare terminal.
Yuping Zhou   +6 more
wiley   +1 more source

Security Analysis of Conditional Privacy-Preserving Authentication Schemes for VANETs

open access: yesIEEE Access, 2023
In order to solve security and privacy-preservation issues in VANETs, a number of conditional privacy-preservation schemes based on certificateless signature (CLS) schemes and certificateless aggregate signature (CLAS) schemes have been proposed. However,
Kyung-Ah Shim
doaj   +1 more source

Home - About - Disclaimer - Privacy