Results 41 to 50 of about 1,931 (198)
New Efficient Certificateless Signature Scheme [PDF]
In ubiquitous computing environment, how to implement security and trust among the users that connected to a network is a big problem. Digital signature provides authenticity, integrity and nonrepudiation to many kinds of applications in ubiquitous computing environment.
Lei Zhang, Futai Zhang, Fangguo Zhang
openaire +1 more source
Exploratory study to explore the role of ICT in the process of knowledge management in an Indian business environment [PDF]
In the 21st century and the emergence of a digital economy, knowledge and the knowledge base economy are rapidly growing. To effectively be able to understand the processes involved in the creating, managing and sharing of knowledge management in the ...
Gururajan, Raj +3 more
core +2 more sources
Certificateless-based efficient aggregate signature scheme with universal designated verifier
The security model of the certificateless aggregate signature scheme with universal designated verifier was studied,and then a certificateless aggregate signature scheme with universal designated verifier using bilinear pairings was proposed.In the ...
Yu-lei ZHANG +4 more
doaj +2 more sources
New certificateless short signature scheme
The certificateless public key cryptography has attracted wide attention since it could solve the certificate management problem in the traditional public key cryptography and the key escrow problem in the identity‐based public key cryptography. Recently, several certificateless short signature schemes, which could satisfy the requirement of low ...
Debiao He, Baojun Huang, Jianhua Chen
openaire +1 more source
Secure and privacy-aware proxy mobile IPv6 protocol for vehicle-to-grid networks [PDF]
Vehicle-to-Grid (V2G) networks have emerged as a new communication paradigm between Electric Vehicles (EVs) and the Smart Grid (SG). In order to ensure seamless communications between mobile EVs and the electric vehicle supply equipment, the support of ...
Hashem-Eiza, Mahmoud +3 more
core +2 more sources
Certificateless Signature Scheme Based on Rabin Algorithm and Discrete Logarithm [PDF]
Certificateless signature can effectively immue the key escrow problem in the identity-based signature scheme. But the security of the most certificateless signatures usually depends on only one mathematical hard problem, which makes the signature ...
Li, Chaoyang, Xin, Xiangjun
core +3 more sources
Provably secure certificateless aggregate signature scheme in wireless roaming authentication
Certificateless aggregate signature (CLAS) schemes have been widely applied in resource-constrained wireless mobile networks,because they could not only realize batch validation but also solve the certificate management and key escrow problems.It was ...
Zhi-yan XU +3 more
doaj +2 more sources
Fully Secure Lightweight Certificateless Signature Scheme for IIoT
In recent years, Industrial Internet of Things (IIoT) has become increasingly important for applications in the industry. Inevitably, security for IIoT has become a priority in order to deploy secure applications.
Fatemeh Rezaeibagha +4 more
doaj +1 more source
LIMA: Local and Lightweight Mutual Authentication for VANETs
This work presents LIMA, a lightweight local authentication protocol for VANETs. It is a SAE J2735 compliant certificateless vehicle authentication that eliminates traditional PKI dependencies while providing geographic zone‐based security and time‐based attribute control.
Munkenyi Mukhandi +2 more
wiley +1 more source
The rapid expansion of the Industrial Internet of Things (IIoT) presents pressing challenges for secure, efficient, and privacy‐preserving communication among users, sensors, and cloud infrastructures. Existing lightweight authentication schemes, primarily based on classical cryptographic assumptions, are increasingly vulnerable to the emerging threat ...
Tinashe Magara +2 more
wiley +1 more source

