Results 81 to 90 of about 1,535 (180)

Construction of Certificateless Proxy Signcryption Scheme From CMGs

open access: yesIEEE Access, 2019
As a cryptography primitive for secure data transmission, certificateless proxy signcryption (CLPS) allows an original signcrypter to entrust his signing authority to a proxy signcrypter for signing specified message on his behalf.
Huifang Yu, Zhicang Wang
doaj   +1 more source

Pencegah Pembajakan Perangkat Lunak Dengan Menggunakan Teknik Identity-Based Encryption Dan Obfuscation [PDF]

open access: yes, 2009
Serangan-serangan terhadap proteksi hak cipta tentunya sangat merugikan pihak produsen yang telah susah payah membangun perangkat lunak ciptaannya. Teknik obfuscation dapat digunakan untuk melindungi isi perangkat lunak dari pesaing atau penyerang yang ...
Wardiana, W. (Wawan)
core  

Functional Message Authentication Codes With Message and Function Privacy

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
Functional signatures were allowed anyone to sign any messages in the range of function f, who possesses the secret key skf. However, the existing construction does not satisfy the property of message and function privacy. In this paper, we propose a new notion which is called functional message authentication codes (MACs).
Pu Li   +3 more
wiley   +1 more source

A Lightweight Authentication and Key Agreement Schemes for IoT Environments

open access: yesSensors, 2020
In the Internet of Things (IoT) environment, more types of devices than ever before are connected to the internet to provide IoT services. Smart devices are becoming more intelligent and improving performance, but there are devices with little computing ...
Dae-Hwi Lee, Im-Yeong Lee
doaj   +1 more source

多人数署名の証明可能安全性に関する研究 [PDF]

open access: yes, 2014
筑波大学 (University of Tsukuba ...
Yanai Naoto, 矢内 直人
core  

An Efficient Elliptic Curve Cryptography‐Based Secure Communication with Privacy Preserving for Autonomous Vehicle

open access: yesJournal of Advanced Transportation, Volume 2024, Issue 1, 2024.
Internet of Vehicles can improve driving and riding experience, provide information needs, reduce environmental pollution, and improve transportation efficiency, thereby promoting the rapid development and application of intelligent transportation. Especially through the advantages of the rapidity of information exchange and the flexibility of real ...
Jiongen Xiao   +5 more
wiley   +1 more source

Still Wrong Use of Pairings in Cryptography [PDF]

open access: yes, 2016
Several pairing-based cryptographic protocols are recently proposed with a wide variety of new novel applications including the ones in emerging technologies like cloud computing, internet of things (IoT), e-health systems and wearable technologies ...
Kiraz, Mehmet Sabir, Uzunkol, Osmanbey
core   +1 more source

An Elliptic Curve Menezes–Qu–Vanston‐Based Authentication and Encryption Protocol for IoT

open access: yesWireless Communications and Mobile Computing, Volume 2024, Issue 1, 2024.
The exponential growth of the Internet of Things (IoT) has led to a surge in data generation, critical for business decisions. Ensuring data authenticity and integrity over unsecured channels is vital, especially due to potential catastrophic consequences of tampered data.
Susovan Chanda   +5 more
wiley   +1 more source

Privacy-Preserving Multi-Receiver Certificateless Broadcast Encryption Scheme with De-Duplication

open access: yesSensors, 2019
Nowadays, the widely deployed and high performance Internet of Things (IoT) facilitates the communication between its terminal nodes. To enhance data sharing among terminal devices and ensure the recipients’ privacy protection, a few anonymous ...
Jianhong Zhang, Peirong Ou
doaj   +1 more source

Cryptography: Mathematical Advancements on Cyber Security [PDF]

open access: yes, 2019
The origin of cryptography, the study of encoding and decoding messages, dates back to ancient times around 1900 BC. The ancient Egyptians enlisted the use of basic encryption techniques to conceal personal information.
Bower, Kristin
core   +1 more source

Home - About - Disclaimer - Privacy