Results 11 to 20 of about 2,177 (206)

Towards Risk‐Free Trustworthy Artificial Intelligence: Significance and Requirements

open access: yesInternational Journal of Intelligent Systems, Volume 2023, Issue 1, 2023., 2023
Given the tremendous potential and influence of artificial intelligence (AI) and algorithmic decision‐making (DM), these systems have found wide‐ranging applications across diverse fields, including education, business, healthcare industries, government, and justice sectors.
Laith Alzubaidi   +21 more
wiley   +1 more source

Provably Secure and Lightweight Patient Monitoring Protocol for Wireless Body Area Network in IoHT

open access: yesJournal of Healthcare Engineering, Volume 2023, Issue 1, 2023., 2023
As one of the important applications of Internet of Health Things (IoHT) technology in the field of healthcare, wireless body area network (WBAN) has been widely used in medical therapy, and it can not only monitor and record physiological information but also transmit the data collected by sensor devices to the server in time.
Qi Xie   +5 more
wiley   +1 more source

Toward an RSU-unavailable lightweight certificateless key agreement scheme for VANETs [PDF]

open access: yes, 2014
Vehicle ad-hoc networks have developed rapidly these years, whose security and privacy issues are always concerned widely. In spite of a remarkable research on their security solutions, but in which there still lacks considerations on how to secure ...
He, Chunjiao   +4 more
core   +1 more source

[Retracted] A Comprehensive Review of Lightweight Authenticated Encryption for IoT Devices

open access: yesWireless Communications and Mobile Computing, Volume 2023, Issue 1, 2023., 2023
Internet of Things (IoT) is a promising technology for creating smart environments, smart systems, and smart services. Since security is a fundamental requirement of IoT platforms, solutions that can provide both encryption and authenticity simultaneously have recently attracted much attention from academia and industry. This article analyses in detail
Zainab AlJabri   +3 more
wiley   +1 more source

RSA authentication mechanisms in control grid computing environment using Gridsim toolkit [PDF]

open access: yes, 2015
There are security concerns when our sensitive data is placed in the third party infrastructure such as in the Grid Computing environment. As such, it is difficult to be assured that our data is in the safe hands.Thus, authentication has become the most
Ismail, Saiful Adli   +4 more
core   +2 more sources

Reattack of a Certificateless Aggregate Signature Scheme with Constant Pairing Computations

open access: yesThe Scientific World Journal, 2014
A new attack against a novel certificateless aggregate signature scheme with constant pairing computations is presented. To enhance security, a new certificateless signature scheme is proposed first.
Hang Tu, Debiao He, Baojun Huang
doaj   +1 more source

Efficient and Provably Secure Certificateless Signature Schemes [PDF]

open access: yesJisuanji gongcheng, 2016
Certificateless public key cryptography solves the key escrow problem of identity-based cryptography.In common with identity-based cryptography,certificateless public key cryptography does not rely on certificate.Therefor,this paper references from the ...
TANG Yongli,WANG Feifei,YAN Xixi,LI Zichen
doaj   +1 more source

Lightweight certificateless and provably-secure signcryptosystem for the internet of things [PDF]

open access: yes, 2015
International audienceIn this paper, we propose an elliptic curve-based signcryption scheme derived from the standardized signature KCDSA (Korean Certificate-based Digital Signature Algorithm) in the context of the Internet of Things.
Laurent, Maryline   +2 more
core   +2 more sources

Novel lightweight signcryption-based key distribution mechanisms for MIKEY [PDF]

open access: yes, 2016
Part 1: Authentication and Key ManagementInternational audienceMultimedia Internet KEYing (MIKEY) is a standard key management protocol, used to set up common secrets between any two parties for multiple scenarios of communications.
Laurent, Maryline   +2 more
core   +3 more sources

Lattice-Based Revocable Certificateless Signature

open access: yesSymmetry, 2017
Certificateless signatures (CLS) are noticeable because they may resolve the key escrow problem in ID-based signatures and break away the management problem regarding certificate in conventional signatures. However, the security of the mostly previous CLS schemes relies on the difficulty of solving discrete logarithm or large integer factorization ...
Hung, Ying-Hao   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy