An Approach to Guide Users Towards Less Revealing Internet Browsers [PDF]
When browsing the Internet, HTTP headers enable both clients and servers send extra data in their requests or responses such as the User-Agent string.
Mohammad, Lena +4 more
core +1 more source
Certificateless Aggregate Signatures: A Comprehensive Survey and Comparative Analysis [PDF]
This paper presents a comprehensive survey of the certificateless aggregate signature scheme in terms of their computational performance and security. This signature scheme is of significant interest because of its relevance in various domains such as ...
Rupesh Kumar Verma +3 more
doaj +3 more sources
Cryptanalysis and Improvement of Three Certificateless Aggregate Signature Schemes
The certificateless aggregate signature (CLAS) scheme is a very important data aggregation technique that compresses a large number of signatures from different users into a short signature. CLAS can reduce the total length of a signature and the computational overhead of signature verification and is therefore highly suitable for resource‐constrained ...
Xiaodong Yang +5 more
wiley +1 more source
Location Privacy in VANETs: Improved Chaff-Based CMIX and Privacy-Preserving End-to-End Communication [PDF]
VANETs communication systems are technologies and defined policies that can be formed to enable ITS applications to provide road traffic efficacy, warning about such issues as environmental dangers, journey circumstances, and in the provision of ...
Al-Marshoud, Mishri Saleh
core
Comments on “Certificateless Short Aggregate Signature Scheme for Mobile Devices”
In the above paper “Certificateless Short Aggregate Signature Scheme for Mobile Devices” a pairing-based certificateless aggregate signature (CLAS) scheme was proposed. Although the authors claim that their CLAS scheme is secure and provide
Je Hong Park, Bonwook Koo
doaj +1 more source
Revolutionizing VANET Security: Decentralized Authentication with Edge Aggregation and Blockchain Logging [PDF]
In the context of vehicular ad-hoc networks (VANETs), secure and efficient authentication mechanisms are essential to support safety-critical communications within highly dynamic and resource-constrained environments.
Amer, Hanan M. +3 more
core +1 more source
ID-CAKE: Identity-based Cluster Authentication and Key Exchange Scheme for Message Broadcasting and Batch Verification in VANETs [PDF]
Vehicle Ad Hoc Networks (VANETs) play a pivotal role in intelligent transportation systems, offering dynamic communication between vehicles, Road Side Units (RSUs), and the internet. Given the open-access nature of VANETs and the associated threats, such
Alia Umrani +2 more
core
A note on ‘An efficient certificateless aggregate signature with constant pairing computations’ [PDF]
Recently, Xiong et al. [H. Xiong, Z. Guan, Z. Chen, F. Li, An efficient certificateless aggregate signature with constant pairing computations, Information Science, 219, pp.
Debiao He, Jianhua Chen, Miaomiao Tian
core
Provably secure certificateless aggregate signature scheme in wireless roaming authentication
Certificateless aggregate signature (CLAS) schemes have been widely applied in resource-constrained wireless mobile networks,because they could not only realize batch validation but also solve the certificate management and key escrow problems.It was ...
Zhi-yan XU +3 more
doaj +2 more sources
On security of a Certificateless Aggregate Signature Scheme [PDF]
Aggregate signatures are useful in special areas where the signatures on many different messages generated by many different users need to be compressed. Recently, Xiong et al.
Limin Shen, Yinxia Sun
core

