Results 81 to 90 of about 1,921 (200)
Two secure non-symmetric role Key-Agreement protocols [PDF]
Recently, some two-party Authenticated Key Agreement protocols over elliptic curve based algebraic groups, in the context of Identity-Based cryptography have been proposed.
Chizari, H. +3 more
core
Certificate less sequential multi-signature scheme could resolve the problem of authentication of recommendation information transmitted through trust train.Qin yan-lin,et al proposed an efficient certificateless sequential multi-signature scheme,and ...
Yan XU +3 more
doaj +2 more sources
Certificateless Anonymous Authentication Scheme Supporting Illegal Signatures Localization for Internet of Vehicles [PDF]
In the Internet of Vehicles (IoV) environment, vehicles are connected to public networks through the Internet and information is vulnerable to various malicious attacks from attackers during transmission.
YANG Xiaodong, LI Muzi, MA Guozu, LI Songyu, WANG Caifen
doaj +1 more source
Still Wrong Use of Pairings in Cryptography [PDF]
Several pairing-based cryptographic protocols are recently proposed with a wide variety of new novel applications including the ones in emerging technologies like cloud computing, internet of things (IoT), e-health systems and wearable technologies ...
Kiraz, Mehmet Sabir, Uzunkol, Osmanbey
core +1 more source
Pencegah Pembajakan Perangkat Lunak Dengan Menggunakan Teknik Identity-Based Encryption Dan Obfuscation [PDF]
Serangan-serangan terhadap proteksi hak cipta tentunya sangat merugikan pihak produsen yang telah susah payah membangun perangkat lunak ciptaannya. Teknik obfuscation dapat digunakan untuk melindungi isi perangkat lunak dari pesaing atau penyerang yang ...
Wardiana, W. (Wawan)
core
In the above paper “A Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme in the Standard Model for VANETs,” a pairing-based certificateless aggregate signature (CLAS) scheme was proposed.
Je Hong Park, Bonwook Koo
doaj +1 more source
A Revocable Certificateless Sanitizable Signature Scheme With Batch Verification
In medical and healthcare application scenarios, data integrity and user privacy are often concerned the most. A sanitizable signature scheme is a common adopted approach since it admits an authorized person to sanitize partial sensitive information of ...
Han-Yu Lin, Tung-Tso Tsai, Hsu-Lun Wu
doaj +1 more source
Development of a certificate less digital signature scheme & implementation in e-cash system [PDF]
Today’s wireless communication systems having limited computational resources and communication bandwidth find certificate less public-key cryptosystems very attractive and vital to their operations in the sense that they help in reducing a significant ...
Lenka, Mrutyunjaya, Sahoo, Pravat Kumar
core

