Results 81 to 90 of about 685 (192)
As an emerging application of smart healthcare, mobile healthcare crowd sensing (MHCS) has become a research hotspot. However, how to ensure the confidentiality and integrity of data and protect the privacy of user is still a challenge for MHCS.
Wenming Wang +3 more
doaj +1 more source
Aggregatable Certificateless Designated Verifier Signature
In recent years, the Internet of Things (IoT) devices have become increasingly deployed in many industries and generated a large amount of data that needs to be processed in a timely and efficient manner.
Pairat Thorncharoensri +2 more
doaj +1 more source
Efficient Certificateless Signatures Suitable for Aggregation [PDF]
This technical report describes a novel certificateless signature scheme suitable for aggregation that requires no pairing computations for signing and only 3 pairing computations for signature verification.
Rafael Castro, Ricardo Dahab
core
To solve the privacy-preserving problem during the roaming authentication of wireless mobile networks, a novel roaming authentication scheme with anonymity was presented.
Dan LIU +3 more
doaj +2 more sources
On security of a Certificateless Aggregate Signature Scheme [PDF]
Aggregate signatures are useful in special areas where the signatures on many different messages generated by many different users need to be compressed. Recently, Xiong et al.
Limin Shen, Yinxia Sun
core
Secure and efficient elliptic curve-based certificate-less authentication scheme for solar-based smart grids [PDF]
Solar-based smart grids have emerged as a transformative force, encapsulating a paradigm shift towards decentralized and sustainable power generation.
Ahasun Habib Ratul, Md +6 more
core +2 more sources
MDBV: Monitoring Data Batch Verification for Survivability of Internet of Vehicles
Along with the development of vehicular sensors and wireless communication technology, Internet of Vehicles (IoV) is emerging that can improve traffic efficiency and provide a comfortable driving environment.
Jingwei Liu +5 more
doaj +1 more source
Blockchain-based cross-domain authentication in a multi-domain Internet of drones environment [PDF]
As a new paradigm, the Internet of drones (IoD) is making the future easy with its flexibility and wide range of applications. However, these drones are prone to security attacks during communication because of this flexibility.
Karmegam, Arivarasan +2 more
core +1 more source
WiBPA: An Efficient Data Integrity Auditing Scheme Without Bilinear Pairings [PDF]
The security of cloud data has always been a concern. Cloud server provider may maliciously tamper or delete user’s data for their own benefit, so data integrity audit is of great significance to verify whether data is modified or not.
Changhong Sun +4 more
core +2 more sources
Security Enhanced CLS and CL-AS Scheme Without Pairings for VANETs
While vehicle ad-hoc networks (VANETs) have many advantages, they also present privacy and security concerns. Certificate management issues have been seen in traditional public key infrastructure-based privacy-preserving authentication schemes, while key
Anjali Bansal +4 more
doaj +1 more source

