Results 71 to 80 of about 437 (175)
Certificateless Cryptographic Protocols for Efficient Drone-Based Smart City Applications
Smart cities aim to improve the quality of urban services and their energy efficiency by utilizing information and communication technologies. In such context, drones can be utilized to support various services, such as traffic monitoring, search/rescue,
Jongho Won +2 more
doaj +1 more source
Leakage-resilient certificateless signcryption scheme
In practical applications,the potential adversary may exploit partial information about the secret keys by side-channel attacks ,traditional certificateless signcryption schemes can’t resist these key-leakage attacks.A leakage-resilient certificateless ...
Yan-lin QIN, Xiao-ping WU, Wei HU
doaj +2 more sources
Strongly secure certificateless one-pass authenticated key agreement scheme
As certificateless public key cryptography (CLPKC) could solve the problem of keyescrow, recently it has been studied more and more. Certificateless authenticated keyagreement (CLAKA), as an important part of the CLPKC, also attracts ...
BAOJUN HUANG, HANG TU
doaj
Construction of Certificateless Proxy Signcryption Scheme From CMGs
As a cryptography primitive for secure data transmission, certificateless proxy signcryption (CLPS) allows an original signcrypter to entrust his signing authority to a proxy signcrypter for signing specified message on his behalf.
Huifang Yu, Zhicang Wang
doaj +1 more source
Efficient certificateless sequential multi-signature scheme
The authentication of recommendation information transmitted through trust train is important for trust model in distributed environment. To solve this problem, the security model for the certificateless sequential multi-signature scheme was studied and ...
Yan-lin QIN, Xiao-ping WU
doaj +2 more sources
Vehicular ad hoc networks (VANETs), which are the backbone of intelligent transportation systems (ITSs), facilitate critical data exchanges between vehicles.
Ahmad Kabil +3 more
doaj +1 more source
Due to the single point failure and opaque certificate distribution process of the access authentication methods in a traditional terrestrial network, it was difficult to apply to a spatial information network with a highly complex and dynamic topology ...
HUO Ru +3 more
doaj +2 more sources
Empowering IoV Security: A Novel Secure Cryptographic Algorithm (OpCKEE) for Network Protection in Connected Vehicles. [PDF]
Ebadinezhad S, Nlend Bayemi PF.
europepmc +1 more source
To address the shortcomings of existing authentication schemes in vehicle networks, which commonly suffer from key escrow issues, as well as the lack of consideration for lightweight deployment and secure rapid authentication of compute-constrained ...
ZHENG Lu, FENG Tao, SU Chunhua
doaj +2 more sources
IoT Authentication in Federated Learning: Methods, Challenges, and Future Directions. [PDF]
Badhib A, Alshehri S, Cherif A.
europepmc +1 more source

