Results 41 to 50 of about 685 (192)
Security of IoT in 5G Cellular Networks: A Review of Current Status, Challenges and Future Directions [PDF]
The Internet of Things (IoT) refers to a global network that integrates real life physical objects with the virtual world through the Internet for making intelligent decisions.
Choudhury, Hiten, Goswami, Hemangi
core +2 more sources
Security Vulnerabilities of Four Signature Schemes From NTRU Lattices and Pairings
Certificateless cryptography solves the certificate management problem in public-key cryptography and the key-escrow problem in identity-based cryptography. Xie et al. proposed a certificateless signature scheme using NTRU lattices.
Kyung-Ah Shim
doaj +1 more source
A secure Certificateless Aggregate Signature Scheme
Aggregate signatures allow n signatures on n distinct messages from n distinct signers to be aggregated into a single signature that convinces any verifier that n signers do indeed sign the n messages, respectively. The major advantage of utilizing aggregate signatures is to address the security of data and save bandwidth and computations in sensor ...
Baoyuan Kang, Danhui Xu
openaire +1 more source
Certificateless Aggregate Signature Scheme for Privacy Protection in VANET [PDF]
In Vehicular Ad-hoc Network(VANET),problems such as vulnerable communication data and low computational efficiency are ubiquitous.This paper proposes a certificateless aggregation signature scheme based on certificateless public key cryptosystem and ...
ZHAO Nan, ZHANG Guoan, GU Xiaohui
doaj +1 more source
Options for Securing RTP Sessions [PDF]
The Real-time Transport Protocol (RTP) is used in a large number of different application domains and environments. This heterogeneity implies that different security mechanisms are needed to provide services such as confidentiality ...
Perkins, C., Westerlund, M.
core +2 more sources
Efficient Certificateless Aggregate Signcryption Scheme with Public Verifiability [PDF]
Signcryption technology is the foundation of building a network trust system, which can ensure the confidentiality, integrity and verifiability of data.However, when a large number of users perform signcryption at the same time, the verification takes a ...
CHEN Hong, HOU Yuting, GUO Pengfei, ZHOU Mo, ZHAO Jufang, XIAO Chenglong
doaj +1 more source
Certificateless Signature Scheme Based on Rabin Algorithm and Discrete Logarithm [PDF]
Certificateless signature can effectively immue the key escrow problem in the identity-based signature scheme. But the security of the most certificateless signatures usually depends on only one mathematical hard problem, which makes the signature ...
Li, Chaoyang, Xin, Xiangjun
core +3 more sources
LSKA-ID: A lightweight security and key agreement protocol based on an identity for vehicular communication [PDF]
Recently, a huge effort has been pushed to the wireless broadcasting nature in the open area. However, the vehicular ad hoc network (VANET) is disposed to various kinds of attacks.
Al-Khaleefa, Ahmed Salih +4 more
core +2 more sources
New Construction of Efficient Certificateless Aggregate Signatures
This paper proposes a novel construction of efficient certificateless aggregate signature (CLAS) scheme. On basis of the computational Diffie-Hellman (CDH) assumption, the proposed scheme can be proven existentially unforgeable against adaptive chosen-message attacks.
He Liu +3 more
openaire +1 more source

