Results 41 to 50 of about 138 (95)

A patient agent controlled customized blockchain based framework for internet of things [PDF]

open access: yes, 2021
Although Blockchain implementations have emerged as revolutionary technologies for various industrial applications including cryptocurrencies, they have not been widely deployed to store data streaming from sensors to remote servers in architectures ...
Uddin, Md Ashraf
core   +1 more source

Cryptanalysis of a certificateless aggregate signature scheme [PDF]

open access: yes, 2016
Recently, Nie et al. proposed a certificateless aggregate signature scheme. In the standard security model considered in certificateless cryptography, we are dealing with two types of adversaries.
Mahnaz Noroozi, Nasrollah Pakniat
core  

Authentication Protocols for Internet of Things: A Comprehensive Survey [PDF]

open access: yes, 2016
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT) is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are selected and examined in detail ...
Ferrag, Mohamed Amine   +4 more
core   +5 more sources

New certificateless aggregate signature scheme with universal designated verifier

open access: yesTongxin xuebao, 2017
Certificateless aggregate signature(CLAS) schemes with universal designated verifier had been widely applied in resource-constrained wireless mobile networks,because they could not only solve the problems of the certificate management and private key ...
Zhi-yan XU   +3 more
doaj   +2 more sources

Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks [PDF]

open access: yes, 2016
Secure aggregate signature schemes have attracted more concern due to their wide application in resource constrained environment. Recently, Horng et al. [S. J.
Hong Yuan, Jiguo Li, Yichen Zhang
core  

BeHarmony: blockchain-enabled trustworthy communication and legitimate decision making in multi-party Internet of Vehicles systems [PDF]

open access: yes
The rapid development of the Internet of Vehicles using centralized systems faces significant challenges, including reliability and security vulnerabilities and high latency.
Jin, Guodong   +6 more
core   +1 more source

Data Service Outsourcing and Privacy Protection in Mobile Internet [PDF]

open access: yes, 2018
Mobile Internet data have the characteristics of large scale, variety of patterns, and complex association. On the one hand, it needs efficient data processing model to provide support for data services, and on the other hand, it needs certain computing ...
Deng, Fuhu   +5 more
core   +1 more source

State-of-the-art authentication and verification schemes in VANETs:A survey [PDF]

open access: yes
Vehicular Ad-Hoc Networks (VANETs), a subset of Mobile Ad-Hoc Networks (MANETs), are wireless networks formed around moving vehicles, enabling communication between vehicles, roadside infrastructure, and servers. With the rise of autonomous and connected
Anwar, Adnan   +6 more
core   +1 more source

Leveraging reputation for enhanced decision accuracy in vehicle-to-vehicle communications under limited infrastructure [PDF]

open access: yes
Vehicle-to-Vehicle (V2V) networking enhances transportation safety and efficiency by enabling vehicles to share alerts. However, malicious vehicles may inject false messages, leading to disputes.
Almani, Dimah   +2 more
core   +2 more sources

Identity-based Aggregate Signatures with Verifiable Single Ones [PDF]

open access: yes, 2013
In an aggregate signature scheme, different signatures from different signers on different messages can be aggregated to reduce the cost of computation and communication.
Jun-liang Chen, Yang Zhang
core  

Home - About - Disclaimer - Privacy