Results 91 to 100 of about 1,777 (202)
AIS Authentication Using Certificateless Cryptography
Axel Rousselot +2 more
openaire +2 more sources
Privacy-Preserving Multi-Receiver Certificateless Broadcast Encryption Scheme with De-Duplication
Nowadays, the widely deployed and high performance Internet of Things (IoT) facilitates the communication between its terminal nodes. To enhance data sharing among terminal devices and ensure the recipients’ privacy protection, a few anonymous ...
Jianhong Zhang, Peirong Ou
doaj +1 more source
A Secure and Efficient Key Agreement Protocol Based on Certificateless Cryptography
Almost all the certificateless two-party authenticated key agreement (CTAKA) protocols found in the literature, suffer either serious security problems or inefficient performance that involves high computational costs. In this paper, we design a secure and efficient CTAKA protocol.
Nashwa A.F. Mohamed +3 more
openaire +1 more source
Cryptography: Mathematical Advancements on Cyber Security [PDF]
The origin of cryptography, the study of encoding and decoding messages, dates back to ancient times around 1900 BC. The ancient Egyptians enlisted the use of basic encryption techniques to conceal personal information.
Bower, Kristin
core +1 more source
SciTech News Volume 71, No. 1 (2017) [PDF]
Columns and Reports From the Editor 3 Division News Science-Technology Division 5 Chemistry Division 8 Engineering Division Aerospace Section of the Engineering Division 9 Architecture, Building Engineering, Construction and Design Section of the ...
core +1 more source
Secure and privacy-aware proxy mobile IPv6 protocol for vehicle-to-grid networks [PDF]
Vehicle-to-Grid (V2G) networks have emerged as a new communication paradigm between Electric Vehicles (EVs) and the Smart Grid (SG). In order to ensure seamless communications between mobile EVs and the electric vehicle supply equipment, the support of ...
Hashem Eiza, Mahmoud +3 more
core +2 more sources
Certificateless public key cryptography based provable data possession scheme in edge environment
In the edge environment, data transmission to the cloud needs to pass through a new entity, the edge node, which makes the data security problem more complicated, the confidentiality and integrity of data are difficult to be guaranteed, and the traditional provable data possession scheme is not suitable for the edge environment with a large number of ...
Ziyuan WANG, Ruizhong DU
openaire +2 more sources
Certificateless Cryptographic Protocols for Efficient Drone-Based Smart City Applications
Smart cities aim to improve the quality of urban services and their energy efficiency by utilizing information and communication technologies. In such context, drones can be utilized to support various services, such as traffic monitoring, search/rescue,
Jongho Won +2 more
doaj +1 more source
Leakage-resilient certificateless signcryption scheme
In practical applications,the potential adversary may exploit partial information about the secret keys by side-channel attacks ,traditional certificateless signcryption schemes can’t resist these key-leakage attacks.A leakage-resilient certificateless ...
Yan-lin QIN, Xiao-ping WU, Wei HU
doaj +2 more sources
Strongly secure certificateless one-pass authenticated key agreement scheme
As certificateless public key cryptography (CLPKC) could solve the problem of keyescrow, recently it has been studied more and more. Certificateless authenticated keyagreement (CLAKA), as an important part of the CLPKC, also attracts ...
BAOJUN HUANG, HANG TU
doaj

