Results 41 to 50 of about 1,921 (200)
SPATA: Strong Pseudonym based AuthenTicAtion in Intelligent Transport System [PDF]
Intelligent Transport System (ITS) is generally deployed to improve road safety, comfort, security, and traffic efficiency. A robust mechanism of authentication and secure communication is required to protect privacy and conditional resolution of ...
Ahmad, Naveed +6 more
core +1 more source
New Efficient Certificateless Signature Scheme [PDF]
In ubiquitous computing environment, how to implement security and trust among the users that connected to a network is a big problem. Digital signature provides authenticity, integrity and nonrepudiation to many kinds of applications in ubiquitous computing environment.
Lei Zhang, Futai Zhang, Fangguo Zhang
openaire +1 more source
Fail-Stop Ring Signature Scheme Based on Certificateless Cryptosystem [PDF]
Fail-stop group signature schemes can prevent opponents with strong compute power from counterfeiting signatures,and thereby implement privacy protection for users.On the basis of the fail-stop group signature scheme,this paper designs a fail-stop ring ...
ZHANG Yulei, SONG Tingting, ZHANG Yongjie, WANG Caifen
doaj +1 more source
Relations among notions of complete non-malleability: indistinguishability characterisation and efficient construction without random oracles [PDF]
We study relations among various notions of complete non-malleability, where an adversary can tamper with both ciphertexts and public-keys, and ciphertext indistinguishability.
Barbosa, Manuel, Farshim, Pooya
core +1 more source
New certificateless short signature scheme
The certificateless public key cryptography has attracted wide attention since it could solve the certificate management problem in the traditional public key cryptography and the key escrow problem in the identity‐based public key cryptography. Recently, several certificateless short signature schemes, which could satisfy the requirement of low ...
Debiao He, Baojun Huang, Jianhua Chen
openaire +1 more source
Provably secure certificateless aggregate signature scheme in wireless roaming authentication
Certificateless aggregate signature (CLAS) schemes have been widely applied in resource-constrained wireless mobile networks,because they could not only realize batch validation but also solve the certificate management and key escrow problems.It was ...
Zhi-yan XU +3 more
doaj +2 more sources
Fully Secure Lightweight Certificateless Signature Scheme for IIoT
In recent years, Industrial Internet of Things (IIoT) has become increasingly important for applications in the industry. Inevitably, security for IIoT has become a priority in order to deploy secure applications.
Fatemeh Rezaeibagha +4 more
doaj +1 more source
Secure and privacy-aware proxy mobile IPv6 protocol for vehicle-to-grid networks [PDF]
Vehicle-to-Grid (V2G) networks have emerged as a new communication paradigm between Electric Vehicles (EVs) and the Smart Grid (SG). In order to ensure seamless communications between mobile EVs and the electric vehicle supply equipment, the support of ...
Hashem-Eiza, Mahmoud +3 more
core +2 more sources
LIMA: Local and Lightweight Mutual Authentication for VANETs
This work presents LIMA, a lightweight local authentication protocol for VANETs. It is a SAE J2735 compliant certificateless vehicle authentication that eliminates traditional PKI dependencies while providing geographic zone‐based security and time‐based attribute control.
Munkenyi Mukhandi +2 more
wiley +1 more source
The rapid expansion of the Industrial Internet of Things (IIoT) presents pressing challenges for secure, efficient, and privacy‐preserving communication among users, sensors, and cloud infrastructures. Existing lightweight authentication schemes, primarily based on classical cryptographic assumptions, are increasingly vulnerable to the emerging threat ...
Tinashe Magara +2 more
wiley +1 more source

