Results 61 to 70 of about 1,921 (200)

An Anonymous Authentication Scheme in VANETs of Smart City Based on Certificateless Group Signature

open access: yesComplexity, 2020
With the change of the network communication environment in vehicular ad hoc networks (VANETs) of a smart city, vehicles may encounter security threats such as eavesdropping, positioning, and tracking, so appropriate anonymity protection is required ...
Yuanpan Zheng, Guangyu Chen, Liguan Guo
doaj   +1 more source

A lightweight privacy preserving authenticated key agreement protocol for SIP-based VoIP [PDF]

open access: yes, 2016
Session Initiation Protocol (SIP) is an essential part of most Voice over Internet Protocol (VoIP) architecture. Although SIP provides attractive features, it is exposed to various security threats, and so an efficient and secure authentication scheme is
Tang, Shanyu   +2 more
core   +1 more source

Quantum blockchain: Trends, technologies, and future directions

open access: yesIET Quantum Communication, Volume 5, Issue 4, Page 516-542, December 2024.
This article surveys the current state of blockchain technology, emphasising its security, authentication protocols, AI integration, and the emerging field of quantum blockchain. It highlights how quantum computing can enhance blockchain security and the necessity for quantum‐resistant designs to ensure the robustness of blockchain networks against ...
Manjula Gandhi S   +15 more
wiley   +1 more source

Comments on “Certificateless Short Aggregate Signature Scheme for Mobile Devices”

open access: yesIEEE Access
In the above paper “Certificateless Short Aggregate Signature Scheme for Mobile Devices” a pairing-based certificateless aggregate signature (CLAS) scheme was proposed. Although the authors claim that their CLAS scheme is secure and provide
Je Hong Park, Bonwook Koo
doaj   +1 more source

Secure semi‐automated GDPR compliance service with restrictive fine‐grained access control

open access: yesSECURITY AND PRIVACY, Volume 7, Issue 6, November/December 2024.
Abstract Sharing personal data with service providers is a contentious issue that led to the birth of data regulations such as the EU General Data Protection Regulation (GDPR) and similar laws in the US. Complying with these regulations is a must for service providers.
Max Hashem Eiza   +3 more
wiley   +1 more source

A Certificateless Verifiable Strong Designated Verifier Signature Scheme

open access: yesIEEE Access, 2019
Certificateless strong designated verifier signature schemes have realized the merit of CL-PKC against the traditional strong designated verifier signatures.
Shu Han   +8 more
doaj   +1 more source

FGDB‐MLPP: A fine‐grained data‐sharing scheme with blockchain based on multi‐level privacy protection

open access: yesIET Communications, Volume 18, Issue 4, Page 309-321, March 2024.
(1) A blockchain‐based efficient data‐sharing scheme is proposed, which employs the ciphertext policy attribute‐based encryption algorithm to enable fine‐grained sharing of data resources. (2) An anonymous identity authentication method based on ring signatures is proposed, which can effectively protect the user's identity privacy and transaction ...
Junyu Lin   +6 more
wiley   +1 more source

Modelling and simulation of a biometric identity-based cryptography [PDF]

open access: yes, 2014
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks.
Aljeaid, D, Langensiepen, C, Ma, X
core   +1 more source

A lightweight smart contracts framework for blockchain‐based secure communication in smart grid applications

open access: yesIET Generation, Transmission &Distribution, Volume 18, Issue 3, Page 625-638, February 2024.
This article proposes a blockchain‐based secure communication framework for events monitoring and control in micro renewable energy systems. Abstract Energy is a crucial need in today's world for powering homes, businesses, transportation, and industrial processes.
Muhammad Faheem   +4 more
wiley   +1 more source

Performance and Security Evaluations of Identity-and Pairing-based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, McCullagh and Quisquater, and Paterson and Schuldt [PDF]

open access: yes, 2018
Bilinear pairing, an essential tool to construct-efficient digital signatures, has applications in mobile devices and other applications. One particular research challenge is to design cross-platform security protocols (e.g.
Choo, Kim-Kwang Raymond   +4 more
core   +2 more sources

Home - About - Disclaimer - Privacy