Results 71 to 80 of about 685 (192)
Towards secure and resilient unmanned aerial vehicles swarm network based on blockchain
Abstract Blockchain, as an emerging technology, has found diverse applications in solving trust issues in multi‐party cooperation. The field of Unmanned Aerial Vehicle (UAV) swarm networks is no exception, as UAVs are susceptible to attacks from malicious counterparts due to limited computing and storage resources. In this paper, the authors present an
Xin Zhou, Lin Yang, Linru MA, Huasen He
wiley +1 more source
Quantum blockchain: Trends, technologies, and future directions
This article surveys the current state of blockchain technology, emphasising its security, authentication protocols, AI integration, and the emerging field of quantum blockchain. It highlights how quantum computing can enhance blockchain security and the necessity for quantum‐resistant designs to ensure the robustness of blockchain networks against ...
Manjula Gandhi S +15 more
wiley +1 more source
Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks [PDF]
Secure aggregate signature schemes have attracted more concern due to their wide application in resource constrained environment. Recently, Horng et al. [S. J.
Hong Yuan, Jiguo Li, Yichen Zhang
core
Named Data Networking (NDN) is a promising network architecture that differs from the traditional TCP/IP network, as it focuses on data rather than the host. A new secure model is required to provide the data‐oriented trust instead of the host‐oriented trust.
Bing Li +3 more
wiley +1 more source
A note on ‘An efficient certificateless aggregate signature with constant pairing computations’ [PDF]
Recently, Xiong et al. [H. Xiong, Z. Guan, Z. Chen, F. Li, An efficient certificateless aggregate signature with constant pairing computations, Information Science, 219, pp.
Debiao He, Jianhua Chen, Miaomiao Tian
core
Energy-efficient certificateless signcryption for secure data transfer in wireless sensor networks [PDF]
Wireless sensor networks (WSN) have gained high popularity in the realm of technological innovation and have a prime responsibility of transferring the data safely to the sink despite the vulnerable situation presiding around the network.
Balusamy, Sargunam +1 more
core +2 more sources
Security analysis of two lightweight certificateless signature schemes [PDF]
Certificateless cryptography can be considered as an intermediate solution to overcome the issues in traditional public key infrastructure (PKI) and identity-based public key cryptography (ID-PKC).
Nasrollah Pakniat
core +2 more sources
Internet of Vehicles can improve driving and riding experience, provide information needs, reduce environmental pollution, and improve transportation efficiency, thereby promoting the rapid development and application of intelligent transportation. Especially through the advantages of the rapidity of information exchange and the flexibility of real ...
Jiongen Xiao +5 more
wiley +1 more source
Vehicular ad hoc networks (VANETs) are the communication foundation for future intelligent transportation systems and guarantee safe driving of intelligent networked vehicles.
Huiwen Wang +4 more
doaj +1 more source
A COMPREHENSIVE STUDY OF CRYPTOGRAPHY AND KEY MANAGEMENT BASED SECURITY IN CLOUD COMPUTING [PDF]
Cloud computing is a cost effective flexible and proven delivery platform for providing consumer IT services or business services over internet. It has an ability to provide many services over internet.
Amutharaj, J. +2 more
core +1 more source

