Results 141 to 150 of about 2,177 (206)
Sybil-resistant and privacy-preserving authentication based on short-term pseudonym for internet of vehicles. [PDF]
Zhang C +4 more
europepmc +1 more source
Blockchain-Enabled Identity Based Authentication Scheme for Cellular Connected Drones. [PDF]
Su Y +5 more
europepmc +1 more source
Post-Quantum Revocable Linkable Ring Signature Scheme Based on SPHINCS+ for V2G Scenarios. [PDF]
Liu S, Du YN, Wang XA, Hu X, Su HE.
europepmc +1 more source
Efficient ring signature for cross-chain data sharing in blockchain-enabled cold-chain logistics system. [PDF]
Zhang Y, Tang Y, Li C, Zhang H, Ahmad H.
europepmc +1 more source
Security importance of edge-IoT ecosystem: An ECC-based authentication scheme. [PDF]
Alzahrani N.
europepmc +1 more source
A cooperative ECC-based authentication protocol for VANETs. [PDF]
Liu Z, Yao N, Bai S, Mai T.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Certificateless Threshold Ring Signature
Information Sciences, 2009zbMATH Open Web Interface contents unavailable due to conflicting licenses.
chang, shuang +3 more
openaire +4 more sources
On constructing certificateless proxy signature from certificateless signature
Journal of Shanghai Jiaotong University (Science), 2008In proxy signature schemes, an original signer A delegates its signing capability to a proxy signer B, in such a way that B can sign message on behalf of A. The recipient of the final message verifies at the same time that B computes the signature and that A has delegated its signing capability to B.
Zhong-mei Wan +5 more
openaire +1 more source

