Results 21 to 30 of about 685 (192)

Certificateless Public Auditing for Cloud‐Based Medical Data in Healthcare Industry 4.0

open access: yesInternational Journal of Intelligent Systems, Volume 2023, Issue 1, 2023., 2023
In the context of healthcare 4.0, cloud‐based eHealth is a common paradigm, enabling stakeholders to access medical data and interact efficiently. However, it still faces some serious security issues that cannot be ignored. One of the major challenges is the assurance of the integrity of medical data remotely stored in the cloud. To solve this problem,
Hui Tian   +5 more
wiley   +1 more source

Design Principles of Secure Certificateless Signature and Aggregate Signature Schemes for IoT Environments

open access: yesIEEE Access, 2022
Certificateless cryptography resolves the certificate management problem of public-key cryptography and the key-escrow problem of identity-based cryptography.
Kyung-Ah Shim
doaj   +1 more source

Blockchain-based V2G Certificateless Ring Signcryption Privacy Protection Scheme [PDF]

open access: yesJisuanji gongcheng, 2023
A blockchain-based certificateless ring signature privacy protection scheme is proposed to ensure the privacy protection of vehicle user transaction information and secure transmission of communication messages in the Vehicle-to-Grid(V2G) system.To ...
CHEN Fuan, LIU Yi
doaj   +1 more source

Towards Risk‐Free Trustworthy Artificial Intelligence: Significance and Requirements

open access: yesInternational Journal of Intelligent Systems, Volume 2023, Issue 1, 2023., 2023
Given the tremendous potential and influence of artificial intelligence (AI) and algorithmic decision‐making (DM), these systems have found wide‐ranging applications across diverse fields, including education, business, healthcare industries, government, and justice sectors.
Laith Alzubaidi   +21 more
wiley   +1 more source

Provably Secure and Lightweight Patient Monitoring Protocol for Wireless Body Area Network in IoHT

open access: yesJournal of Healthcare Engineering, Volume 2023, Issue 1, 2023., 2023
As one of the important applications of Internet of Health Things (IoHT) technology in the field of healthcare, wireless body area network (WBAN) has been widely used in medical therapy, and it can not only monitor and record physiological information but also transmit the data collected by sensor devices to the server in time.
Qi Xie   +5 more
wiley   +1 more source

A certificateless aggregate signature scheme for security and privacy protection in VANET

open access: yesInternational Journal of Distributed Sensor Networks, 2022
In the vehicular ad hoc network, moving vehicles can keep communicating with each other by entering or leaving the network at any time to establish a new connection.
Eko Fajar Cahyadi   +3 more
doaj   +1 more source

An Efficient Pairing‐Free Certificateless Signature Scheme with KGC Trust Level 3 for Wireless Sensor Network

open access: yesWireless Communications and Mobile Computing, Volume 2023, Issue 1, 2023., 2023
With the widespread adoption of wireless sensor networks (WSN), the security of the WSN has been a wide concern. Certificateless signature eliminates the certificate management problem and key escrow problem and is considered a feasible solution to solve the data integrity and authentication of WSN. Recently, Thumbur et al.
Hong Zhao   +4 more
wiley   +1 more source

Certificateless Aggregate Signature Scheme Based on No Pairing Mapping [PDF]

open access: yesJisuanji gongcheng, 2017
The security and reliability of the transmission of signals collected by the detection terminals and sensors of great importance in the high-rail track signal detection system.However,the relevant signal processing device is limited in computing power ...
ZUO Liming,ZHANG Tingting,GUO Hongli,CHEN Zuosong
doaj   +1 more source

A trust‐based mechanism for drones in smart cities

open access: yesIET Smart Cities, Volume 4, Issue 4, Page 255-264, December 2022., 2022
Abstract Smart cities equipped with intelligent devices can enhance the lifestyle and quality of humans by automatically and collaboratively acting as a sustainable resource to the ecosystem. In addition, the technological advancement can be further empowered by interconnecting various types of technologies, such as IoT, Artificial Intelligence, drones
Geetanjali Rathee   +3 more
wiley   +1 more source

Privacy‐preserving blockchain‐based authentication and trust management in VANETs

open access: yesIET Networks, Volume 11, Issue 3-4, Page 89-111, May-July 2022., 2022
Abstract Vehicular Ad Hoc Networks (VANETs) are characterized by high mobility of nodes and volatility, which make privacy, trust management, and security challenging issues in VANETs' design. In such networks, data can be exposed to a variety of attacks, the most dangerous is false information dissemination, which threatens the safety and efficiency ...
Waheeb Ahmed, Wu Di, Daniel Mukathe
wiley   +1 more source

Home - About - Disclaimer - Privacy