Results 21 to 30 of about 685 (192)
Certificateless Public Auditing for Cloud‐Based Medical Data in Healthcare Industry 4.0
In the context of healthcare 4.0, cloud‐based eHealth is a common paradigm, enabling stakeholders to access medical data and interact efficiently. However, it still faces some serious security issues that cannot be ignored. One of the major challenges is the assurance of the integrity of medical data remotely stored in the cloud. To solve this problem,
Hui Tian +5 more
wiley +1 more source
Certificateless cryptography resolves the certificate management problem of public-key cryptography and the key-escrow problem of identity-based cryptography.
Kyung-Ah Shim
doaj +1 more source
Blockchain-based V2G Certificateless Ring Signcryption Privacy Protection Scheme [PDF]
A blockchain-based certificateless ring signature privacy protection scheme is proposed to ensure the privacy protection of vehicle user transaction information and secure transmission of communication messages in the Vehicle-to-Grid(V2G) system.To ...
CHEN Fuan, LIU Yi
doaj +1 more source
Towards Risk‐Free Trustworthy Artificial Intelligence: Significance and Requirements
Given the tremendous potential and influence of artificial intelligence (AI) and algorithmic decision‐making (DM), these systems have found wide‐ranging applications across diverse fields, including education, business, healthcare industries, government, and justice sectors.
Laith Alzubaidi +21 more
wiley +1 more source
Provably Secure and Lightweight Patient Monitoring Protocol for Wireless Body Area Network in IoHT
As one of the important applications of Internet of Health Things (IoHT) technology in the field of healthcare, wireless body area network (WBAN) has been widely used in medical therapy, and it can not only monitor and record physiological information but also transmit the data collected by sensor devices to the server in time.
Qi Xie +5 more
wiley +1 more source
A certificateless aggregate signature scheme for security and privacy protection in VANET
In the vehicular ad hoc network, moving vehicles can keep communicating with each other by entering or leaving the network at any time to establish a new connection.
Eko Fajar Cahyadi +3 more
doaj +1 more source
With the widespread adoption of wireless sensor networks (WSN), the security of the WSN has been a wide concern. Certificateless signature eliminates the certificate management problem and key escrow problem and is considered a feasible solution to solve the data integrity and authentication of WSN. Recently, Thumbur et al.
Hong Zhao +4 more
wiley +1 more source
Certificateless Aggregate Signature Scheme Based on No Pairing Mapping [PDF]
The security and reliability of the transmission of signals collected by the detection terminals and sensors of great importance in the high-rail track signal detection system.However,the relevant signal processing device is limited in computing power ...
ZUO Liming,ZHANG Tingting,GUO Hongli,CHEN Zuosong
doaj +1 more source
A trust‐based mechanism for drones in smart cities
Abstract Smart cities equipped with intelligent devices can enhance the lifestyle and quality of humans by automatically and collaboratively acting as a sustainable resource to the ecosystem. In addition, the technological advancement can be further empowered by interconnecting various types of technologies, such as IoT, Artificial Intelligence, drones
Geetanjali Rathee +3 more
wiley +1 more source
Privacy‐preserving blockchain‐based authentication and trust management in VANETs
Abstract Vehicular Ad Hoc Networks (VANETs) are characterized by high mobility of nodes and volatility, which make privacy, trust management, and security challenging issues in VANETs' design. In such networks, data can be exposed to a variety of attacks, the most dangerous is false information dissemination, which threatens the safety and efficiency ...
Waheeb Ahmed, Wu Di, Daniel Mukathe
wiley +1 more source

