Results 221 to 230 of about 1,926,564 (269)
A Survey on Privacy Preservation Techniques in IoT Systems. [PDF]
Kaur R, Rodrigues T, Kadir N, Kashef R.
europepmc +1 more source
The State of Practice About Security in Telemedicine Systems in Chile: Exploratory Study.
Marquez G +5 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
A Lightweight Cryptographic Protocol with Certificateless Signature for the Internet of Things
ACM Transactions on Embedded Computing Systems, 2019The universality of smart-devices has brought rapid development and the significant advancement of ubiquitous applications for the Internet of Things (IoT).
Lu Zhou, Chunhua Su, Kuo-Hui Yeh
semanticscholar +1 more source
An improved version of the AAG cryptographic protocol
Groups Complex. Cryptol., 2019An improved version of the Anshel–Anshel–Goldfeld (AAG) algebraic cryptographic key-exchange scheme, that is in particular resistant against the Tsaban linear span cryptanalysis, is established.
V. Roman’kov
semanticscholar +1 more source
Hybrid Cryptographic Protocol for Secure Vehicle Data Sharing Over a Consortium Blockchain
2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 2018The blockchain technology has recently attracted increasing interests in a wide range of use-cases. Among those, the management of vehicles' data and life cycle over a blockchain has sparked various research initiatives on a global scale, with the ...
Kei-Léo Brousmiche +5 more
semanticscholar +1 more source
A Quantum Cryptographic Protocol for Secure Vehicular Communication
IEEE transactions on intelligent transportation systems (Print)In foggy highways, the secure vehicular communication system can be very important in preventing traffic chaos, congestion, and accident; however, potential attackers may hack this system that can create many problems in controlling or managing the ...
Kartick Sutradhar
semanticscholar +1 more source
Proofs that yield nothing but their validity and a methodology of cryptographic protocol design
27th Annual Symposium on Foundations of Computer Science (sfcs 1986), 1986In this paper we demonstrate the generality and wide applicability of zero-knowledge proofs, a notion introduced by Goldwasser, Micali and Rackoff.
Oded Goldreich, S. Micali, A. Wigderson
semanticscholar +1 more source
An IND-ID-CPA Secure ID-Based Cryptographic Protocol using GDLP and IFP
Informatica, 2017C. Meshram +3 more
semanticscholar +1 more source

