Results 81 to 90 of about 685 (192)

Cryptanalysis and Improvement of an Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing

open access: yesIEEE Access, 2019
As an emerging application of smart healthcare, mobile healthcare crowd sensing (MHCS) has become a research hotspot. However, how to ensure the confidentiality and integrity of data and protect the privacy of user is still a challenge for MHCS.
Wenming Wang   +3 more
doaj   +1 more source

Aggregatable Certificateless Designated Verifier Signature

open access: yesIEEE Access, 2020
In recent years, the Internet of Things (IoT) devices have become increasingly deployed in many industries and generated a large amount of data that needs to be processed in a timely and efficient manner.
Pairat Thorncharoensri   +2 more
doaj   +1 more source

Efficient Certificateless Signatures Suitable for Aggregation [PDF]

open access: yes, 2007
This technical report describes a novel certificateless signature scheme suitable for aggregation that requires no pairing computations for signing and only 3 pairing computations for signature verification.
Rafael Castro, Ricardo Dahab
core  

Efficient anonymous roaming authentication scheme using certificateless aggregate signature in wireless network

open access: yesTongxin xuebao, 2016
To solve the privacy-preserving problem during the roaming authentication of wireless mobile networks, a novel roaming authentication scheme with anonymity was presented.
Dan LIU   +3 more
doaj   +2 more sources

On security of a Certificateless Aggregate Signature Scheme [PDF]

open access: yes, 2012
Aggregate signatures are useful in special areas where the signatures on many different messages generated by many different users need to be compressed. Recently, Xiong et al.
Limin Shen, Yinxia Sun
core  

Secure and efficient elliptic curve-based certificate-less authentication scheme for solar-based smart grids [PDF]

open access: yes
Solar-based smart grids have emerged as a transformative force, encapsulating a paradigm shift towards decentralized and sustainable power generation.
Ahasun Habib Ratul, Md   +6 more
core   +2 more sources

MDBV: Monitoring Data Batch Verification for Survivability of Internet of Vehicles

open access: yesIEEE Access, 2018
Along with the development of vehicular sensors and wireless communication technology, Internet of Vehicles (IoV) is emerging that can improve traffic efficiency and provide a comfortable driving environment.
Jingwei Liu   +5 more
doaj   +1 more source

Blockchain-based cross-domain authentication in a multi-domain Internet of drones environment [PDF]

open access: yes
As a new paradigm, the Internet of drones (IoD) is making the future easy with its flexibility and wide range of applications. However, these drones are prone to security attacks during communication because of this flexibility.
Karmegam, Arivarasan   +2 more
core   +1 more source

WiBPA: An Efficient Data Integrity Auditing Scheme Without Bilinear Pairings [PDF]

open access: yes, 2019
The security of cloud data has always been a concern. Cloud server provider may maliciously tamper or delete user’s data for their own benefit, so data integrity audit is of great significance to verify whether data is modified or not.
Changhong Sun   +4 more
core   +2 more sources

Security Enhanced CLS and CL-AS Scheme Without Pairings for VANETs

open access: yesIEEE Access
While vehicle ad-hoc networks (VANETs) have many advantages, they also present privacy and security concerns. Certificate management issues have been seen in traditional public key infrastructure-based privacy-preserving authentication schemes, while key
Anjali Bansal   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy