Results 51 to 60 of about 437 (175)
A Blockchain‐Based Certificateless Anonymous Cross‐Domain Authentication Scheme for IoV
As an essential component of the internet of things, the internet of vehicles (IoV) holds broad application prospects in areas such as safe driving, intelligent transportation, and service reservations. Due to the security and privacy requirements, anonymous authentication schemes are widely used in IoV. However, traditional certificate‐based anonymous
Hua Wang +5 more
wiley +1 more source
Towards secure and resilient unmanned aerial vehicles swarm network based on blockchain
Abstract Blockchain, as an emerging technology, has found diverse applications in solving trust issues in multi‐party cooperation. The field of Unmanned Aerial Vehicle (UAV) swarm networks is no exception, as UAVs are susceptible to attacks from malicious counterparts due to limited computing and storage resources. In this paper, the authors present an
Xin Zhou, Lin Yang, Linru MA, Huasen He
wiley +1 more source
Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks [PDF]
As various applications of wireless ad hoc network have been proposed, security has become one of the big research challenges and is receiving increasing attention. In this paper, we propose a distributed key management approach by using the recently developed concepts of certificateless public key cryptography and threshold secret sharing schemes ...
Fagen Li +2 more
openaire +1 more source
Quantum blockchain: Trends, technologies, and future directions
This article surveys the current state of blockchain technology, emphasising its security, authentication protocols, AI integration, and the emerging field of quantum blockchain. It highlights how quantum computing can enhance blockchain security and the necessity for quantum‐resistant designs to ensure the robustness of blockchain networks against ...
Manjula Gandhi S +15 more
wiley +1 more source
Enhancing offloading with cybersecurity in edge computing for digital twin‐driven patient monitoring
This study presents a novel Digital Twin (DT) framework for remote healthcare monitoring, integrating edge computing with robust cybersecurity measures to enhance patient care. By employing advanced encryption, threat prediction, and secure communication protocols, we demonstrate a substantial improvement in data transmission security and efficiency ...
Ahmed K. Jameil, Hamed Al‐Raweshidy
wiley +1 more source
Secure semi‐automated GDPR compliance service with restrictive fine‐grained access control
Abstract Sharing personal data with service providers is a contentious issue that led to the birth of data regulations such as the EU General Data Protection Regulation (GDPR) and similar laws in the US. Complying with these regulations is a must for service providers.
Max Hashem Eiza +3 more
wiley +1 more source
Efficient Privacy-Preserving Certificateless Provable Data Possession Scheme for Cloud Storage
Cloud computing is a burgeoning paradigm that offers reliable and adaptive infrastructure to the data owner who shares his data with the data user through the cloud server.
Yang Ming, Wenchang Shi
doaj +1 more source
(1) A blockchain‐based efficient data‐sharing scheme is proposed, which employs the ciphertext policy attribute‐based encryption algorithm to enable fine‐grained sharing of data resources. (2) An anonymous identity authentication method based on ring signatures is proposed, which can effectively protect the user's identity privacy and transaction ...
Junyu Lin +6 more
wiley +1 more source
Efficient Certificateless Public Key Cryptography With Equality Test for Internet of Vehicles [PDF]
The fast progression of the Internet of Vehicles (IoV) has resulted in a large number of vehicles connecting to networks. This leads to massive growth in the data collected from vehicles via IoV. Fortunately, cloud computing provides a vast range of services such as operating systems, hardware, software, and resources.
Rashad Elhabob +3 more
openaire +2 more sources
This article proposes a blockchain‐based secure communication framework for events monitoring and control in micro renewable energy systems. Abstract Energy is a crucial need in today's world for powering homes, businesses, transportation, and industrial processes.
Muhammad Faheem +4 more
wiley +1 more source

