Results 31 to 40 of about 1,501 (161)

A certificateless Multi-receiver Encryption scheme based on SM2 signature algorithm

open access: yesHigh-Confidence Computing, 2023
The Multi-receiver Encryption (MRE) scheme can meet the secure data transmission requirements in multicast and broadcast scenarios. To meet compliance, critical information infrastructure in China should be protected with Chinese national commercial ...
Jinglin Zou   +5 more
doaj   +1 more source

Enabling Secure Communication in Wireless Body Area Networks with Heterogeneous Authentication Scheme. [PDF]

open access: yesSensors (Basel), 2023
Thanks to the widespread availability of Fifth Generation (5G) wireless connectivity, it is now possible to provide preventative or proactive healthcare services from any location and at any time.
Ullah I   +5 more
europepmc   +2 more sources

A lightweight privacy preserving authenticated key agreement protocol for SIP-based VoIP [PDF]

open access: yes, 2016
Session Initiation Protocol (SIP) is an essential part of most Voice over Internet Protocol (VoIP) architecture. Although SIP provides attractive features, it is exposed to various security threats, and so an efficient and secure authentication scheme is
Tang, Shanyu   +2 more
core   +1 more source

Cryptanalysis and improvement of an efficient certificateless signature scheme

open access: yes, 2008
In traditional digital signature schemes, certificates signed by a trusted party are required to ensure the authenticity of the public key. In Asiacrypt 2003, the concept of certificateless signature scheme was introduced.
Huang, Xinyi, Li, Jiguo, Mu, Yi, Wu, Wei
core   +1 more source

An Efficient and Provably Secure Certificateless Key-Encapsulated Signcryption Scheme for Flying Ad-hoc Network

open access: yesIEEE Access, 2020
A Flying Ad-hoc Network (FANET) consists of Unmanned Aerial Vehicles (UAVs) tasked to handle the communication jobs in a multi-hop ad-hoc fashion. Unlike its predecessors, i.e.
Muhammad Asghar Khan   +6 more
doaj   +1 more source

Security analysis and improvement of a certificateless signcryption scheme

open access: yesTongxin xuebao, 2015
To solve the certificate management problem in the traditional public key cryptography and the key escrow problem in the identity-based public key cryptography, Al-Riyami and Paterson proposed the concept of the certificateless public key cryptography ...
Zhen-guo ZHAO
doaj   +2 more sources

A Distributed and Decentralized Certificateless Framework for Reliable Shared Data Auditing for FOG-CPS Networks

open access: yesIEEE Access, 2023
FOG computing enhances communication efficiency by processing data at the network’s edge. In many critical infrastructure (CI) networks, user entities outsource data to the FOG server, but the reliability of the data is a concern.
Manohar Sai Burra, Soumyadev Maity
doaj   +1 more source

LIMA: Local and Lightweight Mutual Authentication for VANETs

open access: yesIET Intelligent Transport Systems, Volume 20, Issue 1, January/December 2026.
This work presents LIMA, a lightweight local authentication protocol for VANETs. It is a SAE J2735 compliant certificateless vehicle authentication that eliminates traditional PKI dependencies while providing geographic zone‐based security and time‐based attribute control.
Munkenyi Mukhandi   +2 more
wiley   +1 more source

Secure and privacy-aware proxy mobile IPv6 protocol for vehicle-to-grid networks [PDF]

open access: yes, 2016
Vehicle-to-Grid (V2G) networks have emerged as a new communication paradigm between Electric Vehicles (EVs) and the Smart Grid (SG). In order to ensure seamless communications between mobile EVs and the electric vehicle supply equipment, the support of ...
Hashem-Eiza, Mahmoud   +3 more
core   +2 more sources

Certificateless Provable Group Shared Data Possession with Comprehensive Privacy Preservation for Cloud Storage

open access: yesFuture Internet, 2018
Provable Data Possession (PDP) protocol makes it possible for cloud users to check whether the cloud servers possess their original data without downloading all the data.
Hongbin Yang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy