Results 81 to 90 of about 1,921 (200)

Two secure non-symmetric role Key-Agreement protocols [PDF]

open access: yes, 2016
Recently, some two-party Authenticated Key Agreement protocols over elliptic curve based algebraic groups, in the context of Identity-Based cryptography have been proposed.
Chizari, H.   +3 more
core  

Provably secure and efficient certificateless sequential multi-signature scheme in random oracle model

open access: yesTongxin xuebao, 2014
Certificate less sequential multi-signature scheme could resolve the problem of authentication of recommendation information transmitted through trust train.Qin yan-lin,et al proposed an efficient certificateless sequential multi-signature scheme,and ...
Yan XU   +3 more
doaj   +2 more sources

Certificateless Anonymous Authentication Scheme Supporting Illegal Signatures Localization for Internet of Vehicles [PDF]

open access: yesJisuanji gongcheng
In the Internet of Vehicles (IoV) environment, vehicles are connected to public networks through the Internet and information is vulnerable to various malicious attacks from attackers during transmission.
YANG Xiaodong, LI Muzi, MA Guozu, LI Songyu, WANG Caifen
doaj   +1 more source

Still Wrong Use of Pairings in Cryptography [PDF]

open access: yes, 2016
Several pairing-based cryptographic protocols are recently proposed with a wide variety of new novel applications including the ones in emerging technologies like cloud computing, internet of things (IoT), e-health systems and wearable technologies ...
Kiraz, Mehmet Sabir, Uzunkol, Osmanbey
core   +1 more source

Pencegah Pembajakan Perangkat Lunak Dengan Menggunakan Teknik Identity-Based Encryption Dan Obfuscation [PDF]

open access: yes, 2009
Serangan-serangan terhadap proteksi hak cipta tentunya sangat merugikan pihak produsen yang telah susah payah membangun perangkat lunak ciptaannya. Teknik obfuscation dapat digunakan untuk melindungi isi perangkat lunak dari pesaing atau penyerang yang ...
Wardiana, W. (Wawan)
core  

Comments on “A Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme in the Standard Model for VANETs”

open access: yesIEEE Access
In the above paper “A Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme in the Standard Model for VANETs,” a pairing-based certificateless aggregate signature (CLAS) scheme was proposed.
Je Hong Park, Bonwook Koo
doaj   +1 more source

多人数署名の証明可能安全性に関する研究 [PDF]

open access: yes, 2014
筑波大学 (University of Tsukuba ...
Yanai Naoto, 矢内 直人
core  

A Revocable Certificateless Sanitizable Signature Scheme With Batch Verification

open access: yesIEEE Access
In medical and healthcare application scenarios, data integrity and user privacy are often concerned the most. A sanitizable signature scheme is a common adopted approach since it admits an authorized person to sanitize partial sensitive information of ...
Han-Yu Lin, Tung-Tso Tsai, Hsu-Lun Wu
doaj   +1 more source

Development of a certificate less digital signature scheme & implementation in e-cash system [PDF]

open access: yes, 2012
Today’s wireless communication systems having limited computational resources and communication bandwidth find certificate less public-key cryptosystems very attractive and vital to their operations in the sense that they help in reducing a significant ...
Lenka, Mrutyunjaya, Sahoo, Pravat Kumar
core  

Home - About - Disclaimer - Privacy