Results 41 to 50 of about 1,921 (200)

SPATA: Strong Pseudonym based AuthenTicAtion in Intelligent Transport System [PDF]

open access: yes, 2018
Intelligent Transport System (ITS) is generally deployed to improve road safety, comfort, security, and traffic efficiency. A robust mechanism of authentication and secure communication is required to protect privacy and conditional resolution of ...
Ahmad, Naveed   +6 more
core   +1 more source

New Efficient Certificateless Signature Scheme [PDF]

open access: yes, 2007
In ubiquitous computing environment, how to implement security and trust among the users that connected to a network is a big problem. Digital signature provides authenticity, integrity and nonrepudiation to many kinds of applications in ubiquitous computing environment.
Lei Zhang, Futai Zhang, Fangguo Zhang
openaire   +1 more source

Fail-Stop Ring Signature Scheme Based on Certificateless Cryptosystem [PDF]

open access: yesJisuanji gongcheng, 2020
Fail-stop group signature schemes can prevent opponents with strong compute power from counterfeiting signatures,and thereby implement privacy protection for users.On the basis of the fail-stop group signature scheme,this paper designs a fail-stop ring ...
ZHANG Yulei, SONG Tingting, ZHANG Yongjie, WANG Caifen
doaj   +1 more source

Relations among notions of complete non-malleability: indistinguishability characterisation and efficient construction without random oracles [PDF]

open access: yes, 2010
We study relations among various notions of complete non-malleability, where an adversary can tamper with both ciphertexts and public-keys, and ciphertext indistinguishability.
Barbosa, Manuel, Farshim, Pooya
core   +1 more source

New certificateless short signature scheme

open access: yesIET Information Security, 2013
The certificateless public key cryptography has attracted wide attention since it could solve the certificate management problem in the traditional public key cryptography and the key escrow problem in the identity‐based public key cryptography. Recently, several certificateless short signature schemes, which could satisfy the requirement of low ...
Debiao He, Baojun Huang, Jianhua Chen
openaire   +1 more source

Provably secure certificateless aggregate signature scheme in wireless roaming authentication

open access: yesTongxin xuebao, 2017
Certificateless aggregate signature (CLAS) schemes have been widely applied in resource-constrained wireless mobile networks,because they could not only realize batch validation but also solve the certificate management and key escrow problems.It was ...
Zhi-yan XU   +3 more
doaj   +2 more sources

Fully Secure Lightweight Certificateless Signature Scheme for IIoT

open access: yesIEEE Access, 2019
In recent years, Industrial Internet of Things (IIoT) has become increasingly important for applications in the industry. Inevitably, security for IIoT has become a priority in order to deploy secure applications.
Fatemeh Rezaeibagha   +4 more
doaj   +1 more source

Secure and privacy-aware proxy mobile IPv6 protocol for vehicle-to-grid networks [PDF]

open access: yes, 2016
Vehicle-to-Grid (V2G) networks have emerged as a new communication paradigm between Electric Vehicles (EVs) and the Smart Grid (SG). In order to ensure seamless communications between mobile EVs and the electric vehicle supply equipment, the support of ...
Hashem-Eiza, Mahmoud   +3 more
core   +2 more sources

LIMA: Local and Lightweight Mutual Authentication for VANETs

open access: yesIET Intelligent Transport Systems, Volume 20, Issue 1, January/December 2026.
This work presents LIMA, a lightweight local authentication protocol for VANETs. It is a SAE J2735 compliant certificateless vehicle authentication that eliminates traditional PKI dependencies while providing geographic zone‐based security and time‐based attribute control.
Munkenyi Mukhandi   +2 more
wiley   +1 more source

PQ‐AuthN‐IIoT: A Lightweight, LWE‐Based Postquantum and Privacy‐Preserving Mutual Authentication Scheme for Resource‐Constrained Industrial IoT Systems

open access: yesJournal of Computer Networks and Communications, Volume 2026, Issue 1, 2026.
The rapid expansion of the Industrial Internet of Things (IIoT) presents pressing challenges for secure, efficient, and privacy‐preserving communication among users, sensors, and cloud infrastructures. Existing lightweight authentication schemes, primarily based on classical cryptographic assumptions, are increasingly vulnerable to the emerging threat ...
Tinashe Magara   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy