Towards Risk‐Free Trustworthy Artificial Intelligence: Significance and Requirements
Given the tremendous potential and influence of artificial intelligence (AI) and algorithmic decision‐making (DM), these systems have found wide‐ranging applications across diverse fields, including education, business, healthcare industries, government, and justice sectors.
Laith Alzubaidi +21 more
wiley +1 more source
Provably Secure and Lightweight Patient Monitoring Protocol for Wireless Body Area Network in IoHT
As one of the important applications of Internet of Health Things (IoHT) technology in the field of healthcare, wireless body area network (WBAN) has been widely used in medical therapy, and it can not only monitor and record physiological information but also transmit the data collected by sensor devices to the server in time.
Qi Xie +5 more
wiley +1 more source
Toward an RSU-unavailable lightweight certificateless key agreement scheme for VANETs [PDF]
Vehicle ad-hoc networks have developed rapidly these years, whose security and privacy issues are always concerned widely. In spite of a remarkable research on their security solutions, but in which there still lacks considerations on how to secure ...
He, Chunjiao +4 more
core +1 more source
[Retracted] A Comprehensive Review of Lightweight Authenticated Encryption for IoT Devices
Internet of Things (IoT) is a promising technology for creating smart environments, smart systems, and smart services. Since security is a fundamental requirement of IoT platforms, solutions that can provide both encryption and authenticity simultaneously have recently attracted much attention from academia and industry. This article analyses in detail
Zainab AlJabri +3 more
wiley +1 more source
RSA authentication mechanisms in control grid computing environment using Gridsim toolkit [PDF]
There are security concerns when our sensitive data is placed in the third party infrastructure such as in the Grid Computing environment. As such, it is difficult to be assured that our data is in the safe hands.Thus, authentication has become the most
Ismail, Saiful Adli +4 more
core +2 more sources
Reattack of a Certificateless Aggregate Signature Scheme with Constant Pairing Computations
A new attack against a novel certificateless aggregate signature scheme with constant pairing computations is presented. To enhance security, a new certificateless signature scheme is proposed first.
Hang Tu, Debiao He, Baojun Huang
doaj +1 more source
Efficient and Provably Secure Certificateless Signature Schemes [PDF]
Certificateless public key cryptography solves the key escrow problem of identity-based cryptography.In common with identity-based cryptography,certificateless public key cryptography does not rely on certificate.Therefor,this paper references from the ...
TANG Yongli,WANG Feifei,YAN Xixi,LI Zichen
doaj +1 more source
Lightweight certificateless and provably-secure signcryptosystem for the internet of things [PDF]
International audienceIn this paper, we propose an elliptic curve-based signcryption scheme derived from the standardized signature KCDSA (Korean Certificate-based Digital Signature Algorithm) in the context of the Internet of Things.
Laurent, Maryline +2 more
core +2 more sources
Novel lightweight signcryption-based key distribution mechanisms for MIKEY [PDF]
Part 1: Authentication and Key ManagementInternational audienceMultimedia Internet KEYing (MIKEY) is a standard key management protocol, used to set up common secrets between any two parties for multiple scenarios of communications.
Laurent, Maryline +2 more
core +3 more sources
Lattice-Based Revocable Certificateless Signature
Certificateless signatures (CLS) are noticeable because they may resolve the key escrow problem in ID-based signatures and break away the management problem regarding certificate in conventional signatures. However, the security of the mostly previous CLS schemes relies on the difficulty of solving discrete logarithm or large integer factorization ...
Hung, Ying-Hao +2 more
openaire +1 more source

