Results 91 to 100 of about 2,177 (206)

Comments on “A Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme in the Standard Model for VANETs”

open access: yesIEEE Access
In the above paper “A Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme in the Standard Model for VANETs,” a pairing-based certificateless aggregate signature (CLAS) scheme was proposed.
Je Hong Park, Bonwook Koo
doaj   +1 more source

$iCLAS$ : An Improved Certificateless Aggregate Signature Scheme for Healthcare Wireless Sensor Networks

open access: yesIEEE Access, 2019
As the world's population gradually enters the aging stage, the smart healthcare demand has become extremely urgent and incomparably important. Healthcare wireless sensor networks (HWSNs) is one of the foundations of smart healthcare. Medical information
Yong Xie   +3 more
doaj   +1 more source

Development of a certificate less digital signature scheme & implementation in e-cash system [PDF]

open access: yes, 2012
Today’s wireless communication systems having limited computational resources and communication bandwidth find certificate less public-key cryptosystems very attractive and vital to their operations in the sense that they help in reducing a significant ...
Lenka, Mrutyunjaya, Sahoo, Pravat Kumar
core  

An Online-Offline Certificateless Signature Scheme for Internet of Health Things. [PDF]

open access: yesJ Healthc Eng, 2020
Khan MA   +6 more
europepmc   +1 more source

Cryptography: Mathematical Advancements on Cyber Security [PDF]

open access: yes, 2019
The origin of cryptography, the study of encoding and decoding messages, dates back to ancient times around 1900 BC. The ancient Egyptians enlisted the use of basic encryption techniques to conceal personal information.
Bower, Kristin
core   +1 more source

Efficient certificateless sequential multi-signature scheme

open access: yesTongxin xuebao, 2013
The authentication of recommendation information transmitted through trust train is important for trust model in distributed environment. To solve this problem, the security model for the certificateless sequential multi-signature scheme was studied and ...
Yan-lin QIN, Xiao-ping WU
doaj   +2 more sources

Fuzzy certificateless signature

open access: yesSecurity and Communication Networks, 2016
Liangliang Wang   +4 more
openaire   +1 more source

Certificateless strong designated verifier multi-signature

open access: yesTongxin xuebao, 2016
In order to satisfy the application requirements in the fields of judicial administration,e-government,etc.,the definition and security model for certificateless strong designated verifier multi-signature were proposed.Then,the first certificateless ...
Hong-zhen DU, Qiao-yan WEN
doaj   +2 more sources

Home - About - Disclaimer - Privacy