Results 51 to 60 of about 437 (175)

A Blockchain‐Based Certificateless Anonymous Cross‐Domain Authentication Scheme for IoV

open access: yesInternational Journal of Intelligent Systems, Volume 2025, Issue 1, 2025.
As an essential component of the internet of things, the internet of vehicles (IoV) holds broad application prospects in areas such as safe driving, intelligent transportation, and service reservations. Due to the security and privacy requirements, anonymous authentication schemes are widely used in IoV. However, traditional certificate‐based anonymous
Hua Wang   +5 more
wiley   +1 more source

Towards secure and resilient unmanned aerial vehicles swarm network based on blockchain

open access: yesIET Blockchain, Volume 4, Issue S1, Page 483-493, December 2024.
Abstract Blockchain, as an emerging technology, has found diverse applications in solving trust issues in multi‐party cooperation. The field of Unmanned Aerial Vehicle (UAV) swarm networks is no exception, as UAVs are susceptible to attacks from malicious counterparts due to limited computing and storage resources. In this paper, the authors present an
Xin Zhou, Lin Yang, Linru MA, Huasen He
wiley   +1 more source

Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks [PDF]

open access: yes, 2008
As various applications of wireless ad hoc network have been proposed, security has become one of the big research challenges and is receiving increasing attention. In this paper, we propose a distributed key management approach by using the recently developed concepts of certificateless public key cryptography and threshold secret sharing schemes ...
Fagen Li   +2 more
openaire   +1 more source

Quantum blockchain: Trends, technologies, and future directions

open access: yesIET Quantum Communication, Volume 5, Issue 4, Page 516-542, December 2024.
This article surveys the current state of blockchain technology, emphasising its security, authentication protocols, AI integration, and the emerging field of quantum blockchain. It highlights how quantum computing can enhance blockchain security and the necessity for quantum‐resistant designs to ensure the robustness of blockchain networks against ...
Manjula Gandhi S   +15 more
wiley   +1 more source

Enhancing offloading with cybersecurity in edge computing for digital twin‐driven patient monitoring

open access: yesIET Wireless Sensor Systems, Volume 14, Issue 6, Page 363-380, December 2024.
This study presents a novel Digital Twin (DT) framework for remote healthcare monitoring, integrating edge computing with robust cybersecurity measures to enhance patient care. By employing advanced encryption, threat prediction, and secure communication protocols, we demonstrate a substantial improvement in data transmission security and efficiency ...
Ahmed K. Jameil, Hamed Al‐Raweshidy
wiley   +1 more source

Secure semi‐automated GDPR compliance service with restrictive fine‐grained access control

open access: yesSECURITY AND PRIVACY, Volume 7, Issue 6, November/December 2024.
Abstract Sharing personal data with service providers is a contentious issue that led to the birth of data regulations such as the EU General Data Protection Regulation (GDPR) and similar laws in the US. Complying with these regulations is a must for service providers.
Max Hashem Eiza   +3 more
wiley   +1 more source

Efficient Privacy-Preserving Certificateless Provable Data Possession Scheme for Cloud Storage

open access: yesIEEE Access, 2019
Cloud computing is a burgeoning paradigm that offers reliable and adaptive infrastructure to the data owner who shares his data with the data user through the cloud server.
Yang Ming, Wenchang Shi
doaj   +1 more source

FGDB‐MLPP: A fine‐grained data‐sharing scheme with blockchain based on multi‐level privacy protection

open access: yesIET Communications, Volume 18, Issue 4, Page 309-321, March 2024.
(1) A blockchain‐based efficient data‐sharing scheme is proposed, which employs the ciphertext policy attribute‐based encryption algorithm to enable fine‐grained sharing of data resources. (2) An anonymous identity authentication method based on ring signatures is proposed, which can effectively protect the user's identity privacy and transaction ...
Junyu Lin   +6 more
wiley   +1 more source

Efficient Certificateless Public Key Cryptography With Equality Test for Internet of Vehicles [PDF]

open access: yesIEEE Access, 2019
The fast progression of the Internet of Vehicles (IoV) has resulted in a large number of vehicles connecting to networks. This leads to massive growth in the data collected from vehicles via IoV. Fortunately, cloud computing provides a vast range of services such as operating systems, hardware, software, and resources.
Rashad Elhabob   +3 more
openaire   +2 more sources

A lightweight smart contracts framework for blockchain‐based secure communication in smart grid applications

open access: yesIET Generation, Transmission &Distribution, Volume 18, Issue 3, Page 625-638, February 2024.
This article proposes a blockchain‐based secure communication framework for events monitoring and control in micro renewable energy systems. Abstract Energy is a crucial need in today's world for powering homes, businesses, transportation, and industrial processes.
Muhammad Faheem   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy