Results 31 to 40 of about 437 (175)

Certificateless Provable Group Shared Data Possession with Comprehensive Privacy Preservation for Cloud Storage

open access: yesFuture Internet, 2018
Provable Data Possession (PDP) protocol makes it possible for cloud users to check whether the cloud servers possess their original data without downloading all the data.
Hongbin Yang   +3 more
doaj   +1 more source

Privacy-Preserving Cloud Auditing for Multiple Users Scheme With Authorization and Traceability

open access: yesIEEE Access, 2020
With the widespread application of cloud storage, users could obtain many conveniences such as low-price data remote storage and flexible data sharing.
Xiaodong Yang   +4 more
doaj   +1 more source

Online/Offline Heterogeneous Signcryption Scheme for WSN [PDF]

open access: yesJisuanji gongcheng, 2017
Aiming at the weak security problem of communication between the sensor nodes and the Internet hosts,a CLPKC-to-TPKC online/offline Heterogeneous Signcryption(HSC) scheme is proposed.Based on the online/offline technology,this paper defines a formalized ...
DANG Xiaochao,LI Qi,HAO Zhanjun,ZHANG Yulei,ZHANG Linggang
doaj   +1 more source

Security analysis and improvement of a certificateless signcryption scheme

open access: yesTongxin xuebao, 2015
To solve the certificate management problem in the traditional public key cryptography and the key escrow problem in the identity-based public key cryptography, Al-Riyami and Paterson proposed the concept of the certificateless public key cryptography ...
Zhen-guo ZHAO
doaj   +2 more sources

An Efficient Heterogeneous Signcryption Scheme from Certificateless to Identity-based Cryptosystem

open access: yesMATEC Web of Conferences, 2017
The heterogeneous signcryption can not only realize the confidentiality and un-forgeability of the information transmission between different public key cryptography environments, but also reduce the communication cost. The proposed scheme uses bilin-ear
Niu Shufen   +4 more
doaj   +1 more source

LIMA: Local and Lightweight Mutual Authentication for VANETs

open access: yesIET Intelligent Transport Systems, Volume 20, Issue 1, January/December 2026.
This work presents LIMA, a lightweight local authentication protocol for VANETs. It is a SAE J2735 compliant certificateless vehicle authentication that eliminates traditional PKI dependencies while providing geographic zone‐based security and time‐based attribute control.
Munkenyi Mukhandi   +2 more
wiley   +1 more source

PQ‐AuthN‐IIoT: A Lightweight, LWE‐Based Postquantum and Privacy‐Preserving Mutual Authentication Scheme for Resource‐Constrained Industrial IoT Systems

open access: yesJournal of Computer Networks and Communications, Volume 2026, Issue 1, 2026.
The rapid expansion of the Industrial Internet of Things (IIoT) presents pressing challenges for secure, efficient, and privacy‐preserving communication among users, sensors, and cloud infrastructures. Existing lightweight authentication schemes, primarily based on classical cryptographic assumptions, are increasingly vulnerable to the emerging threat ...
Tinashe Magara   +2 more
wiley   +1 more source

Fraud Detection in Privacy Preserving Health Insurance System Using Blockchain Technology

open access: yesEngineering Reports, Volume 7, Issue 8, August 2025.
A privacy‐preserving and fraud‐detection‐enabled health insurance claim system has been proposed that addresses the dual challenges of privacy preservation and fraud detection in health insurance claims. The proposed model enables both patients and healthcare providers to submit claims securely, ensuring patient anonymity while effectively detecting ...
Md. Mazharul Islam   +4 more
wiley   +1 more source

Mobile ad-hoc network key management with certificateless cryptography

open access: yes2008 2nd International Conference on Signal Processing and Communication Systems, 2008
In this paper, we present an idea of adopting certificateless public key encryption (CL-PKE) schemes over mobile ad hoc network (MANET), which has not been explored before. In current literature, essentially there exists two main approaches, namely the public key cryptography and identity-based (ID-based) cryptography.
Zhenfei Zhang, Willy Susilo, Raad Raad
openaire   +2 more sources

Blockchain‐Empowered H‐CPS Architecture for Smart Agriculture

open access: yesAdvanced Science, Volume 12, Issue 27, July 17, 2025.
This article reviews the current system architectures for smart agriculture and proposes a blockchain‐empowered hierarchical cyber‐physical system (H‐CPS) framework. It discusses the challenges and outlines future research directions, including the use of semantic blockchain to handle complex data and models.
Xiaoding Wang   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy