Results 21 to 30 of about 1,921 (200)

[Retracted] A Comprehensive Review of Lightweight Authenticated Encryption for IoT Devices

open access: yesWireless Communications and Mobile Computing, Volume 2023, Issue 1, 2023., 2023
Internet of Things (IoT) is a promising technology for creating smart environments, smart systems, and smart services. Since security is a fundamental requirement of IoT platforms, solutions that can provide both encryption and authenticity simultaneously have recently attracted much attention from academia and industry. This article analyses in detail
Zainab AlJabri   +3 more
wiley   +1 more source

Toward an RSU-unavailable lightweight certificateless key agreement scheme for VANETs [PDF]

open access: yes, 2014
Vehicle ad-hoc networks have developed rapidly these years, whose security and privacy issues are always concerned widely. In spite of a remarkable research on their security solutions, but in which there still lacks considerations on how to secure ...
He, Chunjiao   +4 more
core   +1 more source

Reattack of a Certificateless Aggregate Signature Scheme with Constant Pairing Computations

open access: yesThe Scientific World Journal, 2014
A new attack against a novel certificateless aggregate signature scheme with constant pairing computations is presented. To enhance security, a new certificateless signature scheme is proposed first.
Hang Tu, Debiao He, Baojun Huang
doaj   +1 more source

New Certificateless Generalized Signcryption Scheme for Internet of Things Environment [PDF]

open access: yesJisuanji kexue, 2022
Certificateless generalized signcryption (CLGSC) scheme has been widely applied in resource-limited IoT environments for they could not only solve the problems of the certificate management and key escrow,but also serve as encryption,signature,or ...
ZHANG Zhen-chao, LIU Ya-li, YIN Xin-chun
doaj   +1 more source

RSA authentication mechanisms in control grid computing environment using Gridsim toolkit [PDF]

open access: yes, 2015
There are security concerns when our sensitive data is placed in the third party infrastructure such as in the Grid Computing environment. As such, it is difficult to be assured that our data is in the safe hands.Thus, authentication has become the most
Ismail, Saiful Adli   +4 more
core   +2 more sources

Novel lightweight signcryption-based key distribution mechanisms for MIKEY [PDF]

open access: yes, 2016
Part 1: Authentication and Key ManagementInternational audienceMultimedia Internet KEYing (MIKEY) is a standard key management protocol, used to set up common secrets between any two parties for multiple scenarios of communications.
Laurent, Maryline   +2 more
core   +3 more sources

A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks. [PDF]

open access: yes, 2014
Vehicular ad hoc networks (VANETs) provide a safer driving environment by allowing vehicles to broadcast safety related messages and inform neighbouring vehicles regarding traffic and road conditions.
Al-Riyami   +11 more
core   +1 more source

Lightweight certificateless and provably-secure signcryptosystem for the internet of things [PDF]

open access: yes, 2015
International audienceIn this paper, we propose an elliptic curve-based signcryption scheme derived from the standardized signature KCDSA (Korean Certificate-based Digital Signature Algorithm) in the context of the Internet of Things.
Laurent, Maryline   +2 more
core   +2 more sources

Certificateless Aggregate Signature Scheme for Privacy Protection in VANET [PDF]

open access: yesJisuanji gongcheng, 2020
In Vehicular Ad-hoc Network(VANET),problems such as vulnerable communication data and low computational efficiency are ubiquitous.This paper proposes a certificateless aggregation signature scheme based on certificateless public key cryptosystem and ...
ZHAO Nan, ZHANG Guoan, GU Xiaohui
doaj   +1 more source

Integrated Distributed Authentication Protocol for Smart Grid Communications [PDF]

open access: yes, 2018
In the smart grid, an integrated distributed authen- tication protocol is needed to not only securely manage the system but also efficiently authenticate many different entities for the communications.
Choi, B.J., Saxena, N.
core   +3 more sources

Home - About - Disclaimer - Privacy