A patient agent controlled customized blockchain based framework for internet of things [PDF]
Although Blockchain implementations have emerged as revolutionary technologies for various industrial applications including cryptocurrencies, they have not been widely deployed to store data streaming from sensors to remote servers in architectures ...
Uddin, Md Ashraf
core +1 more source
Cryptanalysis of a certificateless aggregate signature scheme [PDF]
Recently, Nie et al. proposed a certificateless aggregate signature scheme. In the standard security model considered in certificateless cryptography, we are dealing with two types of adversaries.
Mahnaz Noroozi, Nasrollah Pakniat
core
Authentication Protocols for Internet of Things: A Comprehensive Survey [PDF]
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT) is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are selected and examined in detail ...
Ferrag, Mohamed Amine +4 more
core +5 more sources
New certificateless aggregate signature scheme with universal designated verifier
Certificateless aggregate signature(CLAS) schemes with universal designated verifier had been widely applied in resource-constrained wireless mobile networks,because they could not only solve the problems of the certificate management and private key ...
Zhi-yan XU +3 more
doaj +2 more sources
Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks [PDF]
Secure aggregate signature schemes have attracted more concern due to their wide application in resource constrained environment. Recently, Horng et al. [S. J.
Hong Yuan, Jiguo Li, Yichen Zhang
core
BeHarmony: blockchain-enabled trustworthy communication and legitimate decision making in multi-party Internet of Vehicles systems [PDF]
The rapid development of the Internet of Vehicles using centralized systems faces significant challenges, including reliability and security vulnerabilities and high latency.
Jin, Guodong +6 more
core +1 more source
Data Service Outsourcing and Privacy Protection in Mobile Internet [PDF]
Mobile Internet data have the characteristics of large scale, variety of patterns, and complex association. On the one hand, it needs efficient data processing model to provide support for data services, and on the other hand, it needs certain computing ...
Deng, Fuhu +5 more
core +1 more source
State-of-the-art authentication and verification schemes in VANETs:A survey [PDF]
Vehicular Ad-Hoc Networks (VANETs), a subset of Mobile Ad-Hoc Networks (MANETs), are wireless networks formed around moving vehicles, enabling communication between vehicles, roadside infrastructure, and servers. With the rise of autonomous and connected
Anwar, Adnan +6 more
core +1 more source
Leveraging reputation for enhanced decision accuracy in vehicle-to-vehicle communications under limited infrastructure [PDF]
Vehicle-to-Vehicle (V2V) networking enhances transportation safety and efficiency by enabling vehicles to share alerts. However, malicious vehicles may inject false messages, leading to disputes.
Almani, Dimah +2 more
core +2 more sources
Identity-based Aggregate Signatures with Verifiable Single Ones [PDF]
In an aggregate signature scheme, different signatures from different signers on different messages can be aggregated to reduce the cost of computation and communication.
Jun-liang Chen, Yang Zhang
core

