Results 101 to 110 of about 1,777 (202)

Construction of Certificateless Proxy Signcryption Scheme From CMGs

open access: yesIEEE Access, 2019
As a cryptography primitive for secure data transmission, certificateless proxy signcryption (CLPS) allows an original signcrypter to entrust his signing authority to a proxy signcrypter for signing specified message on his behalf.
Huifang Yu, Zhicang Wang
doaj   +1 more source

Development of a certificate less digital signature scheme & implementation in e-cash system [PDF]

open access: yes, 2012
Today’s wireless communication systems having limited computational resources and communication bandwidth find certificate less public-key cryptosystems very attractive and vital to their operations in the sense that they help in reducing a significant ...
Lenka, Mrutyunjaya, Sahoo, Pravat Kumar
core  

Efficient certificateless sequential multi-signature scheme

open access: yesTongxin xuebao, 2013
The authentication of recommendation information transmitted through trust train is important for trust model in distributed environment. To solve this problem, the security model for the certificateless sequential multi-signature scheme was studied and ...
Yan-lin QIN, Xiao-ping WU
doaj   +2 more sources

CHAM-CLAS: A Certificateless Aggregate Signature Scheme with Chameleon Hashing-Based Identity Authentication for VANETs

open access: yesCryptography
Vehicular ad hoc networks (VANETs), which are the backbone of intelligent transportation systems (ITSs), facilitate critical data exchanges between vehicles.
Ahmad Kabil   +3 more
doaj   +1 more source

A Systematic Key Management Mechanism for Practical Body Sensor Networks [PDF]

open access: yes
Security plays a vital role in promoting the practicality of Wireless Body Sensor Networks (BSNs), which provides a promising solution to precise human physiological status monitoring.
Fu, Xingwen   +4 more
core  

Pairing-free certificateless blockchain-based access authentication method for spatial information network

open access: yesTongxin xuebao
Due to the single point failure and opaque certificate distribution process of the access authentication methods in a traditional terrestrial network, it was difficult to apply to a spatial information network with a highly complex and dynamic topology ...
HUO Ru   +3 more
doaj   +2 more sources

Research on certificateless anonymous authentication and key agreement scheme of vehicle network based on CPN

open access: yesTongxin xuebao
To address the shortcomings of existing authentication schemes in vehicle networks, which commonly suffer from key escrow issues, as well as the lack of consideration for lightweight deployment and secure rapid authentication of compute-constrained ...
ZHENG Lu, FENG Tao, SU Chunhua
doaj   +2 more sources

Home - About - Disclaimer - Privacy