Results 91 to 100 of about 437 (175)

Security in V2I Communications: A Systematic Literature Review. [PDF]

open access: yesSensors (Basel), 2022
Marcillo P   +3 more
europepmc   +1 more source

A secure multi-party scheme with certificateless cryptography for secret key extraction

open access: yes, 2018
Many systems contain sensitive data such as user credentials used for authentication purposes. For large systems, a common approach is to store the data in a configuration file at a trusted third party. However, that would imply a single point of failure if an adversary gains access to the trusted party. In theory this could be solved by encrypting the
openaire   +1 more source

Home - About - Disclaimer - Privacy