Results 61 to 70 of about 437 (175)
Named Data Networking (NDN) is a promising network architecture that differs from the traditional TCP/IP network, as it focuses on data rather than the host. A new secure model is required to provide the data‐oriented trust instead of the host‐oriented trust.
Bing Li +3 more
wiley +1 more source
Healthcare Internet of Things (IoT) is an emerging paradigm, which can provide comprehensive and different types of health services and enable various types of medical sensors to monitor patient's health conditions.
Yang Ming, Xiaopeng Yu, Xiaoqin Shen
doaj +1 more source
Functional Message Authentication Codes With Message and Function Privacy
Functional signatures were allowed anyone to sign any messages in the range of function f, who possesses the secret key skf. However, the existing construction does not satisfy the property of message and function privacy. In this paper, we propose a new notion which is called functional message authentication codes (MACs).
Pu Li +3 more
wiley +1 more source
Internet of Vehicles can improve driving and riding experience, provide information needs, reduce environmental pollution, and improve transportation efficiency, thereby promoting the rapid development and application of intelligent transportation. Especially through the advantages of the rapidity of information exchange and the flexibility of real ...
Jiongen Xiao +5 more
wiley +1 more source
An Elliptic Curve Menezes–Qu–Vanston‐Based Authentication and Encryption Protocol for IoT
The exponential growth of the Internet of Things (IoT) has led to a surge in data generation, critical for business decisions. Ensuring data authenticity and integrity over unsecured channels is vital, especially due to potential catastrophic consequences of tampered data.
Susovan Chanda +5 more
wiley +1 more source
Efficient Anonymous Certificateless Multi-Receiver Signcryption Scheme Without Bilinear Pairings
Certificateless multi-receiver encryption/signcryption (CLME/CLMS) has become a research hotspot in the field of information security. Almost all of the existing CLME/CLMS schemes are constructed based on the bilinear pairing computation, a time ...
Liaojun Pang +3 more
doaj +1 more source
AIS Authentication Using Certificateless Cryptography
Axel Rousselot +2 more
openaire +2 more sources
Privacy-Preserving Multi-Receiver Certificateless Broadcast Encryption Scheme with De-Duplication
Nowadays, the widely deployed and high performance Internet of Things (IoT) facilitates the communication between its terminal nodes. To enhance data sharing among terminal devices and ensure the recipients’ privacy protection, a few anonymous ...
Jianhong Zhang, Peirong Ou
doaj +1 more source
A Secure and Efficient Key Agreement Protocol Based on Certificateless Cryptography
Almost all the certificateless two-party authenticated key agreement (CTAKA) protocols found in the literature, suffer either serious security problems or inefficient performance that involves high computational costs. In this paper, we design a secure and efficient CTAKA protocol.
Nashwa A.F. Mohamed +3 more
openaire +1 more source
Certificateless public key cryptography based provable data possession scheme in edge environment
In the edge environment, data transmission to the cloud needs to pass through a new entity, the edge node, which makes the data security problem more complicated, the confidentiality and integrity of data are difficult to be guaranteed, and the traditional provable data possession scheme is not suitable for the edge environment with a large number of ...
Ziyuan WANG, Ruizhong DU
openaire +2 more sources

