Results 41 to 50 of about 453 (176)
Security Analysis of Conditional Privacy-Preserving Authentication Schemes for VANETs
In order to solve security and privacy-preservation issues in VANETs, a number of conditional privacy-preservation schemes based on certificateless signature (CLS) schemes and certificateless aggregate signature (CLAS) schemes have been proposed. However,
Kyung-Ah Shim
doaj +1 more source
Secure semi‐automated GDPR compliance service with restrictive fine‐grained access control
Abstract Sharing personal data with service providers is a contentious issue that led to the birth of data regulations such as the EU General Data Protection Regulation (GDPR) and similar laws in the US. Complying with these regulations is a must for service providers.
Max Hashem Eiza +3 more
wiley +1 more source
(1) A blockchain‐based efficient data‐sharing scheme is proposed, which employs the ciphertext policy attribute‐based encryption algorithm to enable fine‐grained sharing of data resources. (2) An anonymous identity authentication method based on ring signatures is proposed, which can effectively protect the user's identity privacy and transaction ...
Junyu Lin +6 more
wiley +1 more source
Comments on “Certificateless Short Aggregate Signature Scheme for Mobile Devices”
In the above paper “Certificateless Short Aggregate Signature Scheme for Mobile Devices” a pairing-based certificateless aggregate signature (CLAS) scheme was proposed. Although the authors claim that their CLAS scheme is secure and provide
Je Hong Park, Bonwook Koo
doaj +1 more source
An Anonymous Authentication Scheme in VANETs of Smart City Based on Certificateless Group Signature
With the change of the network communication environment in vehicular ad hoc networks (VANETs) of a smart city, vehicles may encounter security threats such as eavesdropping, positioning, and tracking, so appropriate anonymity protection is required ...
Yuanpan Zheng, Guangyu Chen, Liguan Guo
doaj +1 more source
Certificateless Aggregate Signature Scheme Based on No Pairing Mapping [PDF]
The security and reliability of the transmission of signals collected by the detection terminals and sensors of great importance in the high-rail track signal detection system.However,the relevant signal processing device is limited in computing power ...
ZUO Liming,ZHANG Tingting,GUO Hongli,CHEN Zuosong
doaj +1 more source
This article proposes a blockchain‐based secure communication framework for events monitoring and control in micro renewable energy systems. Abstract Energy is a crucial need in today's world for powering homes, businesses, transportation, and industrial processes.
Muhammad Faheem +4 more
wiley +1 more source
Named Data Networking (NDN) is a promising network architecture that differs from the traditional TCP/IP network, as it focuses on data rather than the host. A new secure model is required to provide the data‐oriented trust instead of the host‐oriented trust.
Bing Li +3 more
wiley +1 more source
Functional Message Authentication Codes With Message and Function Privacy
Functional signatures were allowed anyone to sign any messages in the range of function f, who possesses the secret key skf. However, the existing construction does not satisfy the property of message and function privacy. In this paper, we propose a new notion which is called functional message authentication codes (MACs).
Pu Li +3 more
wiley +1 more source
Improved certificateless sequential multi-signature scheme
A sequential multi-signature enabled multiple users to jointly sign a document in order.Xu,et al proposed a provably-secure certificateless sequential multi-signature scheme with constant signature length and pairing computations.However,it was shown ...
Hong-zhen DU, Qiao-yan WEN
doaj +2 more sources

