Results 31 to 40 of about 685 (192)

A secure data transmission and efficient data balancing approach for 5G‐based IoT data using UUDIS‐ECC and LSRHS‐CNN algorithms

open access: yesIET Communications, Volume 16, Issue 5, Page 571-583, March 2022., 2022
Abstract Due to the realization of 5G technology, the Internet of things (IoT) has made remarkable advancements in recent years. However, security along with data balancing issues is proffered owing to IoT data's growth. The universally unique identifier short input pseudo‐random (SiP) hash‐based elliptic curve cryptography (UUDIS‐ECC) centred secure ...
Kusum Yadav   +6 more
wiley   +1 more source

Cryptanalysis of Two Signature Schemes for IoT-Based Mobile Payments and Healthcare Wireless Medical Sensor Networks

open access: yesIEEE Access, 2020
Certificateless cryptography does not require any certificate for the public key authentication and users' public keys are transmitted with ciphertext/signatures or by making them available in the IoT-based public directory in a proper way.
Kyung-Ah Shim
doaj   +1 more source

APEX2S: A Two-Layer Machine Learning Model for Discovery of host-pathogen protein-protein Interactions on Cloud-based Multiomics Data [PDF]

open access: yes, 2020
Presented by the avalanche of biological interactions data, computational biology is now facing greater challenges on big data analysis and solicits more studies to mine and integrate cloud-based multiomics data, especially when the data are related to ...
Chen, Huaming   +3 more
core   +2 more sources

[Retracted] An Anonymous Signature‐Based Authentication and Key Agreement Scheme for Vehicular Ad Hoc Networks

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
Anonymous authentication is a critical step in safeguarding vehicle privacy and security in VANETs. VANETs connected with blockchain are gaining popularity as a means to increase the effectiveness of anonymous authentication across many security domains.
Azees M   +3 more
wiley   +1 more source

Public Integrity Auditing of Shared Encrypted Data within Cloud Storage Group

open access: yesWireless Communications and Mobile Computing, Volume 2022, Issue 1, 2022., 2022
The pandemic of COVID‐19 has posed a severe challenge to the traditional on‐site centralized development projects; people therefore have to share data in a group by the cloud storage server and develop projects at home. The cloud server is untrustworthy, although it supplies the powerful computing capability and abundant storage space; so far wide ...
Chunxia Han, Linjie Wang, Yingjie Wang
wiley   +1 more source

A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks. [PDF]

open access: yes, 2014
Vehicular ad hoc networks (VANETs) provide a safer driving environment by allowing vehicles to broadcast safety related messages and inform neighbouring vehicles regarding traffic and road conditions.
Al-Riyami   +11 more
core   +1 more source

Selected Papers from the First International Symposium on Future ICT (Future-ICT 2019) in Conjunction with 4th International Symposium on Mobile Internet Security (MobiSec 2019) [PDF]

open access: yes, 2022
The International Symposium on Future ICT (Future-ICT 2019) in conjunction with the 4th International Symposium on Mobile Internet Security (MobiSec 2019) was held on 17–19 October 2019 in Taichung, Taiwan.

core   +1 more source

[Retracted] Identity‐Based Designated‐Verifier Proxy Signature Scheme with Information Recovery in Telemedicine System

open access: yesWireless Communications and Mobile Computing, Volume 2022, Issue 1, 2022., 2022
With the promotion of Remote Medical Treatment, the sharing of big telemedicine data becomes more and more popular. Telemedicine based on wireless sensor networks collects blood pressure, pH value, pulse, and other medical information from the telemedicine healthcare terminal.
Yuping Zhou   +6 more
wiley   +1 more source

SPATA: Strong Pseudonym based AuthenTicAtion in Intelligent Transport System [PDF]

open access: yes, 2018
Intelligent Transport System (ITS) is generally deployed to improve road safety, comfort, security, and traffic efficiency. A robust mechanism of authentication and secure communication is required to protect privacy and conditional resolution of ...
Ahmad, Naveed   +6 more
core   +1 more source

Security Analysis of Conditional Privacy-Preserving Authentication Schemes for VANETs

open access: yesIEEE Access, 2023
In order to solve security and privacy-preservation issues in VANETs, a number of conditional privacy-preservation schemes based on certificateless signature (CLS) schemes and certificateless aggregate signature (CLAS) schemes have been proposed. However,
Kyung-Ah Shim
doaj   +1 more source

Home - About - Disclaimer - Privacy