Results 61 to 70 of about 1,535 (180)

Two secure non-symmetric role Key-Agreement protocols [PDF]

open access: yes, 2016
Recently, some two-party Authenticated Key Agreement protocols over elliptic curve based algebraic groups, in the context of Identity-Based cryptography have been proposed.
Chizari, H.   +3 more
core  

Cryptanalysis of Keyword Confidentiality in a Searchable Public‐Key Encryption Scheme Against Malicious Server

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
Public‐key authenticated encryption with keyword search (PAEKS) is a novel cryptographic primitive to resist against keyword‐guessing attacks (KGAs) and preserve the privacy of keywords in both ciphertexts and trapdoors. Recently, a designated‐server PAEKS (dPAEKS) scheme was proposed to withstand KGAs.
Nan Zhang   +3 more
wiley   +1 more source

A Certificateless Aggregate Arbitrated Signature Scheme for IoT Environments

open access: yesSensors, 2020
The Internet of Things (IoT) environment consists of numerous devices. In general, IoT devices communicate with each other to exchange data, or connect to the Internet through a gateway to provide IoT services.
Dae-Hwi Lee, Kangbin Yim, Im-Yeong Lee
doaj   +1 more source

Strong knowledge extractors for public-key encryption schemes [PDF]

open access: yes, 2010
Completely non-malleable encryption schemes resist attacks which allow an adversary to tamper with both ciphertexts and public keys. In this paper we introduce two extractor-based properties that allow us to gain insight into the design of such schemes ...
Barbosa, Manuel, Farshim, Pooya
core   +1 more source

Enhanced Cybersecurity Framework for Unmanned Aerial Systems: A Comprehensive STRIDE‐Model Analysis and Emerging Defense Strategies

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
Recent advancements in unmanned aerial vehicle (UAV) technology have facilitated its widespread adoption across a spectrum of sectors, such as commercial logistics, agricultural surveillance, industrial diagnostics, and military maneuvers. However, the widespread adoption has also engendered a burgeoning array of security concerns.
Hailong Xi   +8 more
wiley   +1 more source

Cryptanalysis and improvement of password-authenticated key agreement for session initiation protocol using smart cards [PDF]

open access: yes, 2014
Session Initiation Protocol (SIP) is one of the most commonly used protocols for handling sessions for Voice over Internet Protocol (VoIP)-based communications, and the security of SIP is becoming increasingly important. Recently, Zhang et al. proposed a
Cai, Zhihua, Tang, Shanyu, Zhang, Liping
core   +1 more source

A Blockchain‐Based Certificateless Anonymous Cross‐Domain Authentication Scheme for IoV

open access: yesInternational Journal of Intelligent Systems, Volume 2025, Issue 1, 2025.
As an essential component of the internet of things, the internet of vehicles (IoV) holds broad application prospects in areas such as safe driving, intelligent transportation, and service reservations. Due to the security and privacy requirements, anonymous authentication schemes are widely used in IoV. However, traditional certificate‐based anonymous
Hua Wang   +5 more
wiley   +1 more source

An efficient certificateless authenticated key agreement protocol without bilinear pairings

open access: yes, 2011
Certificateless public key cryptography simplifies the complex certificate management in the traditional public key cryptography and resolves the key escrow problem in identity-based cryptography.
Chen Jianhua   +4 more
core   +1 more source

Modelling and simulation of a biometric identity-based cryptography [PDF]

open access: yes, 2014
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks.
Aljeaid, D, Langensiepen, C, Ma, X
core   +1 more source

Towards secure and resilient unmanned aerial vehicles swarm network based on blockchain

open access: yesIET Blockchain, Volume 4, Issue S1, Page 483-493, December 2024.
Abstract Blockchain, as an emerging technology, has found diverse applications in solving trust issues in multi‐party cooperation. The field of Unmanned Aerial Vehicle (UAV) swarm networks is no exception, as UAVs are susceptible to attacks from malicious counterparts due to limited computing and storage resources. In this paper, the authors present an
Xin Zhou, Lin Yang, Linru MA, Huasen He
wiley   +1 more source

Home - About - Disclaimer - Privacy