Results 71 to 80 of about 685 (192)

Towards secure and resilient unmanned aerial vehicles swarm network based on blockchain

open access: yesIET Blockchain, Volume 4, Issue S1, Page 483-493, December 2024.
Abstract Blockchain, as an emerging technology, has found diverse applications in solving trust issues in multi‐party cooperation. The field of Unmanned Aerial Vehicle (UAV) swarm networks is no exception, as UAVs are susceptible to attacks from malicious counterparts due to limited computing and storage resources. In this paper, the authors present an
Xin Zhou, Lin Yang, Linru MA, Huasen He
wiley   +1 more source

Quantum blockchain: Trends, technologies, and future directions

open access: yesIET Quantum Communication, Volume 5, Issue 4, Page 516-542, December 2024.
This article surveys the current state of blockchain technology, emphasising its security, authentication protocols, AI integration, and the emerging field of quantum blockchain. It highlights how quantum computing can enhance blockchain security and the necessity for quantum‐resistant designs to ensure the robustness of blockchain networks against ...
Manjula Gandhi S   +15 more
wiley   +1 more source

Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks [PDF]

open access: yes, 2016
Secure aggregate signature schemes have attracted more concern due to their wide application in resource constrained environment. Recently, Horng et al. [S. J.
Hong Yuan, Jiguo Li, Yichen Zhang
core  

A Novel Security Scheme Supported by Certificateless Digital Signature and Blockchain in Named Data Networking

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
Named Data Networking (NDN) is a promising network architecture that differs from the traditional TCP/IP network, as it focuses on data rather than the host. A new secure model is required to provide the data‐oriented trust instead of the host‐oriented trust.
Bing Li   +3 more
wiley   +1 more source

A note on ‘An efficient certificateless aggregate signature with constant pairing computations’ [PDF]

open access: yes, 2013
Recently, Xiong et al. [H. Xiong, Z. Guan, Z. Chen, F. Li, An efficient certificateless aggregate signature with constant pairing computations, Information Science, 219, pp.
Debiao He, Jianhua Chen, Miaomiao Tian
core  

Energy-efficient certificateless signcryption for secure data transfer in wireless sensor networks [PDF]

open access: yes
Wireless sensor networks (WSN) have gained high popularity in the realm of technological innovation and have a prime responsibility of transferring the data safely to the sink despite the vulnerable situation presiding around the network.
Balusamy, Sargunam   +1 more
core   +2 more sources

Security analysis of two lightweight certificateless signature schemes [PDF]

open access: yes, 2019
Certificateless cryptography can be considered as an intermediate solution to overcome the issues in traditional public key infrastructure (PKI) and identity-based public key cryptography (ID-PKC).
Nasrollah Pakniat
core   +2 more sources

An Efficient Elliptic Curve Cryptography‐Based Secure Communication with Privacy Preserving for Autonomous Vehicle

open access: yesJournal of Advanced Transportation, Volume 2024, Issue 1, 2024.
Internet of Vehicles can improve driving and riding experience, provide information needs, reduce environmental pollution, and improve transportation efficiency, thereby promoting the rapid development and application of intelligent transportation. Especially through the advantages of the rapidity of information exchange and the flexibility of real ...
Jiongen Xiao   +5 more
wiley   +1 more source

A Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme in the Standard Model for VANETs

open access: yesIEEE Access, 2022
Vehicular ad hoc networks (VANETs) are the communication foundation for future intelligent transportation systems and guarantee safe driving of intelligent networked vehicles.
Huiwen Wang   +4 more
doaj   +1 more source

A COMPREHENSIVE STUDY OF CRYPTOGRAPHY AND KEY MANAGEMENT BASED SECURITY IN CLOUD COMPUTING [PDF]

open access: yes, 2021
Cloud computing is a cost effective flexible and proven delivery platform for providing consumer IT services or business services over internet. It has an ability to provide many services over internet.
Amutharaj, J.   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy