Results 1 to 10 of about 1,921,242 (301)

Security Analysis of Various Authentication Schemes Based on Three Types of Digital Signature Schemes

open access: yesIEEE Access, 2018
To achieve source authentication, message integrity, and non-repudiation, a number of authentication protocols adopt several types of digital signatures: public-key signatures, identity-based signatures, and certificateless signatures.
Kyung-Ah Shim
doaj   +1 more source

Designing Privacy-Preserving Protocols for Content Sharing and Aggregation in Content Centric Networking

open access: yesIEEE Access, 2018
In the content-centric networking (CCN), the content transmitted between data owners, consumers, and the servers is confidential to its publishers.
Shahriar Badsha   +3 more
doaj   +1 more source

Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols [PDF]

open access: gold, 2020
Anum Sajjad   +5 more
openalex   +1 more source

Enhancing security in IIoT: RFID authentication protocol for edge computing and blockchain-enabled supply chain

open access: yesCyber Security and Applications
This paper addresses security challenges, especially in the authentication mechanism of Industrial Internet of Things (IIoT)-enabled supply chain systems by proposing an enhanced Radio Frequency Identification (RFID) authentication protocol.
Vikash Kumar, Santosh Kumar Das
doaj   +1 more source

A Symmetric Key and Elliptic Curve Cryptography-Based Protocol for Message Encryption in Unmanned Aerial Vehicles [PDF]

open access: gold, 2023
Vincent Omollo Nyangaresi   +6 more
openalex   +1 more source

Home - About - Disclaimer - Privacy