Results 81 to 90 of about 1,777 (202)

A lightweight smart contracts framework for blockchain‐based secure communication in smart grid applications

open access: yesIET Generation, Transmission &Distribution, Volume 18, Issue 3, Page 625-638, February 2024.
This article proposes a blockchain‐based secure communication framework for events monitoring and control in micro renewable energy systems. Abstract Energy is a crucial need in today's world for powering homes, businesses, transportation, and industrial processes.
Muhammad Faheem   +4 more
wiley   +1 more source

Efficient Anonymous Certificate-Based Multi- Message and Multi-Receiver Signcryption Scheme for Healthcare Internet of Things

open access: yesIEEE Access, 2020
Healthcare Internet of Things (IoT) is an emerging paradigm, which can provide comprehensive and different types of health services and enable various types of medical sensors to monitor patient's health conditions.
Yang Ming, Xiaopeng Yu, Xiaoqin Shen
doaj   +1 more source

A Novel Security Scheme Supported by Certificateless Digital Signature and Blockchain in Named Data Networking

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
Named Data Networking (NDN) is a promising network architecture that differs from the traditional TCP/IP network, as it focuses on data rather than the host. A new secure model is required to provide the data‐oriented trust instead of the host‐oriented trust.
Bing Li   +3 more
wiley   +1 more source

Pencegah Pembajakan Perangkat Lunak Dengan Menggunakan Teknik Identity-Based Encryption Dan Obfuscation [PDF]

open access: yes, 2009
Serangan-serangan terhadap proteksi hak cipta tentunya sangat merugikan pihak produsen yang telah susah payah membangun perangkat lunak ciptaannya. Teknik obfuscation dapat digunakan untuk melindungi isi perangkat lunak dari pesaing atau penyerang yang ...
Wardiana, W. (Wawan)
core  

Functional Message Authentication Codes With Message and Function Privacy

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
Functional signatures were allowed anyone to sign any messages in the range of function f, who possesses the secret key skf. However, the existing construction does not satisfy the property of message and function privacy. In this paper, we propose a new notion which is called functional message authentication codes (MACs).
Pu Li   +3 more
wiley   +1 more source

Still Wrong Use of Pairings in Cryptography [PDF]

open access: yes, 2016
Several pairing-based cryptographic protocols are recently proposed with a wide variety of new novel applications including the ones in emerging technologies like cloud computing, internet of things (IoT), e-health systems and wearable technologies ...
Kiraz, Mehmet Sabir, Uzunkol, Osmanbey
core   +1 more source

An Efficient Elliptic Curve Cryptography‐Based Secure Communication with Privacy Preserving for Autonomous Vehicle

open access: yesJournal of Advanced Transportation, Volume 2024, Issue 1, 2024.
Internet of Vehicles can improve driving and riding experience, provide information needs, reduce environmental pollution, and improve transportation efficiency, thereby promoting the rapid development and application of intelligent transportation. Especially through the advantages of the rapidity of information exchange and the flexibility of real ...
Jiongen Xiao   +5 more
wiley   +1 more source

Efficient Anonymous Certificateless Multi-Receiver Signcryption Scheme Without Bilinear Pairings

open access: yesIEEE Access, 2018
Certificateless multi-receiver encryption/signcryption (CLME/CLMS) has become a research hotspot in the field of information security. Almost all of the existing CLME/CLMS schemes are constructed based on the bilinear pairing computation, a time ...
Liaojun Pang   +3 more
doaj   +1 more source

多人数署名の証明可能安全性に関する研究 [PDF]

open access: yes, 2014
筑波大学 (University of Tsukuba ...
Yanai Naoto, 矢内 直人
core  

An Elliptic Curve Menezes–Qu–Vanston‐Based Authentication and Encryption Protocol for IoT

open access: yesWireless Communications and Mobile Computing, Volume 2024, Issue 1, 2024.
The exponential growth of the Internet of Things (IoT) has led to a surge in data generation, critical for business decisions. Ensuring data authenticity and integrity over unsecured channels is vital, especially due to potential catastrophic consequences of tampered data.
Susovan Chanda   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy