Results 41 to 50 of about 222 (168)

LIMA: Local and Lightweight Mutual Authentication for VANETs

open access: yesIET Intelligent Transport Systems, Volume 20, Issue 1, January/December 2026.
This work presents LIMA, a lightweight local authentication protocol for VANETs. It is a SAE J2735 compliant certificateless vehicle authentication that eliminates traditional PKI dependencies while providing geographic zone‐based security and time‐based attribute control.
Munkenyi Mukhandi   +2 more
wiley   +1 more source

Provably secure certificateless aggregate signature scheme in wireless roaming authentication

open access: yesTongxin xuebao, 2017
Certificateless aggregate signature (CLAS) schemes have been widely applied in resource-constrained wireless mobile networks,because they could not only realize batch validation but also solve the certificate management and key escrow problems.It was ...
Zhi-yan XU   +3 more
doaj   +2 more sources

PQ‐AuthN‐IIoT: A Lightweight, LWE‐Based Postquantum and Privacy‐Preserving Mutual Authentication Scheme for Resource‐Constrained Industrial IoT Systems

open access: yesJournal of Computer Networks and Communications, Volume 2026, Issue 1, 2026.
The rapid expansion of the Industrial Internet of Things (IIoT) presents pressing challenges for secure, efficient, and privacy‐preserving communication among users, sensors, and cloud infrastructures. Existing lightweight authentication schemes, primarily based on classical cryptographic assumptions, are increasingly vulnerable to the emerging threat ...
Tinashe Magara   +2 more
wiley   +1 more source

Anonymous Certificateless Aggregate Signature Scheme in VANETs [PDF]

open access: yesJisuanji gongcheng
Vehicle Ad-Hoc Networks(VANETs) serve as the foundational infrastructure for future intelligent traffic systems, which will help ensure the safe operation of vehicles. However, in an open wireless communication mode and complex communication environment,
GUO Rui, HU Guoliang, WANG Junming
doaj   +1 more source

Towards quantum‐safe blockchain: Exploration of PQC and public‐key recovery on embedded systems

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
This paper addresses the need for quantum‐safe blockchain solutions specifically for embedded systems by integrating Post‐Quantum Cryptography (PQC) into blockchain frameworks. We propose a quantum‐secure blockchain architecture using NIST‐standardized PQC algorithms, finding Falcon‐512 to be optimal for embedded environments due to its security and ...
Dominik Marchsreiter
wiley   +1 more source

New certificateless aggregate signature scheme with universal designated verifier

open access: yesTongxin xuebao, 2017
Certificateless aggregate signature(CLAS) schemes with universal designated verifier had been widely applied in resource-constrained wireless mobile networks,because they could not only solve the problems of the certificate management and private key ...
Zhi-yan XU   +3 more
doaj   +2 more sources

An Efficient Certificateless Aggregate Signature Scheme Without Pairings for Healthcare Wireless Sensor Network

open access: yesIEEE Access, 2019
Wireless sensor network (WSN) can be widely used in the field of health care since it has many advantages, such as low cost, high efficiency, low latency, and so on.
Hongzhen Du, Qiaoyan Wen, Shanshan Zhang
doaj   +1 more source

An Efficient and Secure Certificateless Aggregate Signature Scheme for Vehicular Ad hoc Networks

open access: yesFuture Internet, 2023
Vehicular ad hoc networks (VANETs) have become an essential part of the intelligent transportation system because they provide secure communication among vehicles, enhance vehicle safety, and improve the driving experience.
Asad Iqbal   +6 more
doaj   +1 more source

Enhanced Cybersecurity Framework for Unmanned Aerial Systems: A Comprehensive STRIDE‐Model Analysis and Emerging Defense Strategies

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
Recent advancements in unmanned aerial vehicle (UAV) technology have facilitated its widespread adoption across a spectrum of sectors, such as commercial logistics, agricultural surveillance, industrial diagnostics, and military maneuvers. However, the widespread adoption has also engendered a burgeoning array of security concerns.
Hailong Xi   +8 more
wiley   +1 more source

An efficient certificateless aggregate signature scheme for vehicular ad-hoc networks [PDF]

open access: yesDiscrete Mathematics & Theoretical Computer Science, 2015
Distributed Computing and ...
Avleen Kaur Malhi, Shalini Batra
doaj   +1 more source

Home - About - Disclaimer - Privacy