Network Performance Improvements for Low-Latency Anonymity Networks [PDF]
While advances to the Internet have enabled users to easily interact and exchange information online, they have also created several opportunities for adversaries to prey on users’ private information.
Al-Sabah, Mashael
core
An innovative reputation system for trustworthy and secure vehicle-to-vehicle communication [PDF]
Vehicular Ad Hoc Networks (VANETs) are a promising technology that ensures secure and efficient transportation by allowing vehicles to seamlessly communicate with each other and with infrastructure to share real-time information and make better decisions
Almani, Dimah
core +2 more sources
CryptoQuest : Adapting Modern Cryptographic Schemes for Resource-Constrained Devices [PDF]
Even though the idea of transforming basic objects into smart objects with sensors is not new, it is only now that we have started seeing the incredible impact of this digital transformation in our societies. There is no doubt that the Internet of Things
Frimpong, Eugene Kwaku
core
OASIS: An organizational certificateLess aggregate signature scheme in distributed networks for IoT [PDF]
International audienceIn recent years, a large number of CertificateLess Aggregate Signature (CLAS) schemes have been proposed to overcome both the complexity of Public Key Infrastructure (PKI) certificate management and the key escrow problem.
Gritti, Clémentine
core +1 more source
Efficient Certificate-Less Aggregate Signature Scheme with Conditional Privacy-Preservation for Vehicular Ad Hoc Networks Enhanced Smart Grid System. [PDF]
Vallent TF, Hanyurwimfura D, Mikeka C.
europepmc +1 more source
Smart Flood Detection with AI and Blockchain Integration in Saudi Arabia Using Drones. [PDF]
Alsumayt A +4 more
europepmc +1 more source
An Efficient Certificateless Aggregate Signature Scheme for Blockchain-Based Medical Cyber Physical Systems. [PDF]
Shu H +5 more
europepmc +1 more source
Formalizing, Analyzing and Improving Aerospace Security Protocols [PDF]
Secure networking protocols for domains such as the internet and the internet-of-things are regularly scrutinized and discussed by the research community.
Wimalasiri, Bhagya
core
Tracking beam and location in wireless networks [PDF]
To meet the stringent requirements in manufacturing, the fifth generation (5G) is integrated with the production process since it supports massive machine type communication (mMTC), ultra-reliable low-latency communications (URLLC), and enhanced mobile ...
Wang, Rui
core
An Aggregate Signature Scheme Based on a Trapdoor Hash Function for the Internet of Things. [PDF]
Shu H +5 more
europepmc +1 more source

