Results 71 to 80 of about 1,931 (198)
Modelling and simulation of a biometric identity-based cryptography [PDF]
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks.
Aljeaid, D, Langensiepen, C, Ma, X
core +1 more source
Named Data Networking (NDN) is a promising network architecture that differs from the traditional TCP/IP network, as it focuses on data rather than the host. A new secure model is required to provide the data‐oriented trust instead of the host‐oriented trust.
Bing Li +3 more
wiley +1 more source
On the Security of Certificateless Signature Schemes
Wireless Sensor Network (WSN) has proved its presence in various real time applications and hence the security of such embedded devices is a vital issue. Certificateless cryptography is one of the recent paradigms to provide security.
Gaurav Sharma, Suman Bala, Anil K. Verma
doaj +1 more source
An anonymous authentication and key establish scheme for smart grid: FAuth [PDF]
The smart meters in electricity grids enable fine-grained consumption monitoring. Thus, suppliers could adjust their tariffs. However, as smart meters are deployed within the smart grid field, authentication and key establishment between smart grid ...
Castillejo Parrilla, Pedro +3 more
core +2 more sources
Functional Message Authentication Codes With Message and Function Privacy
Functional signatures were allowed anyone to sign any messages in the range of function f, who possesses the secret key skf. However, the existing construction does not satisfy the property of message and function privacy. In this paper, we propose a new notion which is called functional message authentication codes (MACs).
Pu Li +3 more
wiley +1 more source
New certificateless aggregate signature scheme with universal designated verifier
Certificateless aggregate signature(CLAS) schemes with universal designated verifier had been widely applied in resource-constrained wireless mobile networks,because they could not only solve the problems of the certificate management and private key ...
Zhi-yan XU +3 more
doaj +2 more sources
Internet of Vehicles can improve driving and riding experience, provide information needs, reduce environmental pollution, and improve transportation efficiency, thereby promoting the rapid development and application of intelligent transportation. Especially through the advantages of the rapidity of information exchange and the flexibility of real ...
Jiongen Xiao +5 more
wiley +1 more source
Cryptanalysis of Compact Certificateless Aggregate Signature Schemes for HWMSNs and VANETs
Certificateless cryptosystems resolve the critical problems in public-key cryptosystems and identity-based cryptosystems. A certificateless aggregate signature scheme aggregates multiple signatures of multiple signers into a single signature that ...
Kyung-Ah Shim
doaj +1 more source
The emergence of Wireless Body Area Networks (WBAN) provides users with ubiquitous wireless communication services, such as continuous exchange of medical information in real time.
Kaixin Zhao +3 more
doaj +1 more source

