Results 51 to 60 of about 1,777 (202)
Secure and privacy-aware proxy mobile IPv6 protocol for vehicle-to-grid networks [PDF]
Vehicle-to-Grid (V2G) networks have emerged as a new communication paradigm between Electric Vehicles (EVs) and the Smart Grid (SG). In order to ensure seamless communications between mobile EVs and the electric vehicle supply equipment, the support of ...
Hashem-Eiza, Mahmoud +3 more
core +2 more sources
LIMA: Local and Lightweight Mutual Authentication for VANETs
This work presents LIMA, a lightweight local authentication protocol for VANETs. It is a SAE J2735 compliant certificateless vehicle authentication that eliminates traditional PKI dependencies while providing geographic zone‐based security and time‐based attribute control.
Munkenyi Mukhandi +2 more
wiley +1 more source
The rapid expansion of the Industrial Internet of Things (IIoT) presents pressing challenges for secure, efficient, and privacy‐preserving communication among users, sensors, and cloud infrastructures. Existing lightweight authentication schemes, primarily based on classical cryptographic assumptions, are increasingly vulnerable to the emerging threat ...
Tinashe Magara +2 more
wiley +1 more source
Mobile ad-hoc network key management with certificateless cryptography
In this paper, we present an idea of adopting certificateless public key encryption (CL-PKE) schemes over mobile ad hoc network (MANET), which has not been explored before. In current literature, essentially there exists two main approaches, namely the public key cryptography and identity-based (ID-based) cryptography.
Zhenfei Zhang, Willy Susilo, Raad Raad
openaire +2 more sources
Fraud Detection in Privacy Preserving Health Insurance System Using Blockchain Technology
A privacy‐preserving and fraud‐detection‐enabled health insurance claim system has been proposed that addresses the dual challenges of privacy preservation and fraud detection in health insurance claims. The proposed model enables both patients and healthcare providers to submit claims securely, ensuring patient anonymity while effectively detecting ...
Md. Mazharul Islam +4 more
wiley +1 more source
Wireless sensor network (WSN) can be widely used in the field of health care since it has many advantages, such as low cost, high efficiency, low latency, and so on.
Hongzhen Du, Qiaoyan Wen, Shanshan Zhang
doaj +1 more source
Cross-domain Identity Authentication Scheme in Cloud Based on Certificateless Signature [PDF]
In view of the shortcoming of failure in cross-domain anonymous authentication scheme based on certificateless public key cryptography,a cross-domain authentication scheme in cloud environment is proposed by using bilinear mapping.On the basis of the ...
YANG Xiaodong,AN Faying,YANG Ping,LIU Tingting,WANG Caifen
doaj +1 more source
Blockchain‐Empowered H‐CPS Architecture for Smart Agriculture
This article reviews the current system architectures for smart agriculture and proposes a blockchain‐empowered hierarchical cyber‐physical system (H‐CPS) framework. It discusses the challenges and outlines future research directions, including the use of semantic blockchain to handle complex data and models.
Xiaoding Wang +8 more
wiley +1 more source
A Flying Ad-hoc Network (FANET) consists of Unmanned Aerial Vehicles (UAVs) tasked to handle the communication jobs in a multi-hop ad-hoc fashion. Unlike its predecessors, i.e.
Muhammad Asghar Khan +6 more
doaj +1 more source
Two secure non-symmetric role Key-Agreement protocols [PDF]
Recently, some two-party Authenticated Key Agreement protocols over elliptic curve based algebraic groups, in the context of Identity-Based cryptography have been proposed.
Chizari, H. +3 more
core

