Session Initiation Protocol Attacks and Challenges
In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP).
Keshavarz, Hassan +2 more
core
Efficient traceable identity-based signature scheme
The inherent key escrow problem is a main disadvantage in identity-based signature schemes. The concept and security model of traceable identity-based signature (T-IBS) was introduced which was a new approach to mitigate the key escrow problem in ...
DU Hong-zhen1, WEN Qiao-yan2
doaj +2 more sources
Efficient certificateless multi-receiver anonymous signcryption scheme
To solve the private key escrow problem of identity-based multi-receiver signcryption schemes,the security model for multi-receiver signcryption scheme was constructed,and then a certificateless multi-receiver signcryption scheme based on ECC was ...
Yan-lin QIN, Xiao-ping WU, Wei HU
doaj +2 more sources
An optimized substitution box generator based on cubic pell curves and its application in image encryption. [PDF]
Khan MAM, Azam NA, Kamarulhaili H.
europepmc +1 more source
Privacy-Preserving ECC-Based AKA for Resource-Constrained IoT Sensor Networks with Forgotten Password Reset. [PDF]
Yu Y, Wei K, Qi K, Wu W.
europepmc +1 more source
Lightweight image encryption for wireless sensor networks using optimized elliptic curve and fuzzy logic. [PDF]
Zarei M +3 more
europepmc +1 more source
Proving vote correctness in the IVXV internet voting system. [PDF]
Kraavi T, Willemson J.
europepmc +1 more source
Empowering IoV Security: A Novel Secure Cryptographic Algorithm (OpCKEE) for Network Protection in Connected Vehicles. [PDF]
Ebadinezhad S, Nlend Bayemi PF.
europepmc +1 more source
Fast parallel molecular algorithms for DNA-based computation: solving the elliptic curve discrete logarithm problem over GF2. [PDF]
Li K, Zou S, Xv J.
europepmc +1 more source
A Survey on Proof of Sequential Work: Development, Security Analysis, and Application Prospects. [PDF]
Zhang J +7 more
europepmc +1 more source

