Results 91 to 100 of about 1,777 (202)

AIS Authentication Using Certificateless Cryptography

open access: yesProceedings of the 20th International Conference on Security and Cryptography, 2023
Axel Rousselot   +2 more
openaire   +2 more sources

Privacy-Preserving Multi-Receiver Certificateless Broadcast Encryption Scheme with De-Duplication

open access: yesSensors, 2019
Nowadays, the widely deployed and high performance Internet of Things (IoT) facilitates the communication between its terminal nodes. To enhance data sharing among terminal devices and ensure the recipients’ privacy protection, a few anonymous ...
Jianhong Zhang, Peirong Ou
doaj   +1 more source

A Secure and Efficient Key Agreement Protocol Based on Certificateless Cryptography

open access: yesInternational Journal of Intelligent Computing Research, 2012
Almost all the certificateless two-party authenticated key agreement (CTAKA) protocols found in the literature, suffer either serious security problems or inefficient performance that involves high computational costs. In this paper, we design a secure and efficient CTAKA protocol.
Nashwa A.F. Mohamed   +3 more
openaire   +1 more source

Cryptography: Mathematical Advancements on Cyber Security [PDF]

open access: yes, 2019
The origin of cryptography, the study of encoding and decoding messages, dates back to ancient times around 1900 BC. The ancient Egyptians enlisted the use of basic encryption techniques to conceal personal information.
Bower, Kristin
core   +1 more source

SciTech News Volume 71, No. 1 (2017) [PDF]

open access: yes, 2017
Columns and Reports From the Editor 3 Division News Science-Technology Division 5 Chemistry Division 8 Engineering Division Aerospace Section of the Engineering Division 9 Architecture, Building Engineering, Construction and Design Section of the ...

core   +1 more source

Secure and privacy-aware proxy mobile IPv6 protocol for vehicle-to-grid networks [PDF]

open access: yes
Vehicle-to-Grid (V2G) networks have emerged as a new communication paradigm between Electric Vehicles (EVs) and the Smart Grid (SG). In order to ensure seamless communications between mobile EVs and the electric vehicle supply equipment, the support of ...
Hashem Eiza, Mahmoud   +3 more
core   +2 more sources

Certificateless public key cryptography based provable data possession scheme in edge environment

open access: yesTongxin xuebao, 2022
In the edge environment, data transmission to the cloud needs to pass through a new entity, the edge node, which makes the data security problem more complicated, the confidentiality and integrity of data are difficult to be guaranteed, and the traditional provable data possession scheme is not suitable for the edge environment with a large number of ...
Ziyuan WANG, Ruizhong DU
openaire   +2 more sources

Certificateless Cryptographic Protocols for Efficient Drone-Based Smart City Applications

open access: yesIEEE Access, 2017
Smart cities aim to improve the quality of urban services and their energy efficiency by utilizing information and communication technologies. In such context, drones can be utilized to support various services, such as traffic monitoring, search/rescue,
Jongho Won   +2 more
doaj   +1 more source

Leakage-resilient certificateless signcryption scheme

open access: yesTongxin xuebao, 2017
In practical applications,the potential adversary may exploit partial information about the secret keys by side-channel attacks ,traditional certificateless signcryption schemes can’t resist these key-leakage attacks.A leakage-resilient certificateless ...
Yan-lin QIN, Xiao-ping WU, Wei HU
doaj   +2 more sources

Strongly secure certificateless one-pass authenticated key agreement scheme

open access: yesKuwait Journal of Science, 2015
As certificateless public key cryptography (CLPKC) could solve the problem of keyescrow, recently it has been studied more and more. Certificateless authenticated keyagreement (CLAKA), as an important part of the CLPKC, also attracts ...
BAOJUN HUANG, HANG TU
doaj  

Home - About - Disclaimer - Privacy