Results 61 to 70 of about 1,501 (161)
Towards secure and resilient unmanned aerial vehicles swarm network based on blockchain
Abstract Blockchain, as an emerging technology, has found diverse applications in solving trust issues in multi‐party cooperation. The field of Unmanned Aerial Vehicle (UAV) swarm networks is no exception, as UAVs are susceptible to attacks from malicious counterparts due to limited computing and storage resources. In this paper, the authors present an
Xin Zhou, Lin Yang, Linru MA, Huasen He
wiley +1 more source
Quantum blockchain: Trends, technologies, and future directions
This article surveys the current state of blockchain technology, emphasising its security, authentication protocols, AI integration, and the emerging field of quantum blockchain. It highlights how quantum computing can enhance blockchain security and the necessity for quantum‐resistant designs to ensure the robustness of blockchain networks against ...
Manjula Gandhi S +15 more
wiley +1 more source
Two secure non-symmetric role Key-Agreement protocols [PDF]
Recently, some two-party Authenticated Key Agreement protocols over elliptic curve based algebraic groups, in the context of Identity-Based cryptography have been proposed.
Chizari, H. +3 more
core
An anonymous authentication and key establish scheme for smart grid: FAuth [PDF]
The smart meters in electricity grids enable fine-grained consumption monitoring. Thus, suppliers could adjust their tariffs. However, as smart meters are deployed within the smart grid field, authentication and key establishment between smart grid ...
Castillejo Parrilla, Pedro +3 more
core +2 more sources
Healthcare Internet of Things (IoT) is an emerging paradigm, which can provide comprehensive and different types of health services and enable various types of medical sensors to monitor patient's health conditions.
Yang Ming, Xiaopeng Yu, Xiaoqin Shen
doaj +1 more source
Enhancing offloading with cybersecurity in edge computing for digital twin‐driven patient monitoring
This study presents a novel Digital Twin (DT) framework for remote healthcare monitoring, integrating edge computing with robust cybersecurity measures to enhance patient care. By employing advanced encryption, threat prediction, and secure communication protocols, we demonstrate a substantial improvement in data transmission security and efficiency ...
Ahmed K. Jameil, Hamed Al‐Raweshidy
wiley +1 more source
Secure semi‐automated GDPR compliance service with restrictive fine‐grained access control
Abstract Sharing personal data with service providers is a contentious issue that led to the birth of data regulations such as the EU General Data Protection Regulation (GDPR) and similar laws in the US. Complying with these regulations is a must for service providers.
Max Hashem Eiza +3 more
wiley +1 more source
Efficient Certificateless Public Key Cryptography With Equality Test for Internet of Vehicles
The fast progression of the Internet of Vehicles (IoV) has resulted in a large number of vehicles connecting to networks. This leads to massive growth in the data collected from vehicles via IoV.
Rashad Elhabob +3 more
doaj +1 more source
(1) A blockchain‐based efficient data‐sharing scheme is proposed, which employs the ciphertext policy attribute‐based encryption algorithm to enable fine‐grained sharing of data resources. (2) An anonymous identity authentication method based on ring signatures is proposed, which can effectively protect the user's identity privacy and transaction ...
Junyu Lin +6 more
wiley +1 more source
Cross-Domain Identity Authentication Scheme Based on Heterogeneous Systems in Hybrid Cloud Environment [PDF]
In the hybrid cloud environment,in order to meet the cross-domain authentication requirements of identity authentication schemes between different cryptosystems,a cross-domain identity authentication scheme based on Public Key Infrastructure(PKI) and ...
JIANG Zetao, SHI Chen
doaj +1 more source

