Results 21 to 30 of about 4,167 (184)

Efficient Secure Computation from SM Series Cryptography

open access: yesWireless Communications and Mobile Computing, Volume 2023, Issue 1, 2023., 2023
The wireless network suffers from many security problems, and computation in a wireless network environment may fail to preserve privacy as well as correctness when the adversaries conduct attacks through backdoors, steganography, kleptography, etc. Secure computation ensures the execution security in such an environment, and compared with computation ...
Yibiao Lu   +4 more
wiley   +1 more source

Securing Topology Control in SDWSNs Using Identity‐Based Cryptography

open access: yesJournal of Sensors, Volume 2023, Issue 1, 2023., 2023
In software‐defined wireless sensor networks (SDWSNs), topology control is a fundamental procedure to maintain the global network topology. However, the open wireless channels of SDWSNs make it possible for an attacker to eavesdrop, replay, or modify the topology messages, thus posing a great threat to the network operations.
Rui Wang   +11 more
wiley   +1 more source

The order elliptic curves over finite fields of characteristic two using the Schoof algorithm [PDF]

open access: yes, 2007
The elliptic curve cryptosystem is a popular cryptosystem. Its safety depends on the difficulty of the elliptic curve discrete logarithm problem (ECDLP). From the viewpoint of ECDLP, it is very interesting to determine the order of elliptic curves.
Imura, Keigo   +2 more
core   +1 more source

Secure and Efficient Smart Healthcare System Based on Federated Learning

open access: yesInternational Journal of Intelligent Systems, Volume 2023, Issue 1, 2023., 2023
The rapid development of smart healthcare system in the Internet of Things (IoT) has made the early detection of many chronic diseases more convenient, quick, and economical. However, when healthcare organizations collect users’ health data through deployed IoT devices, there are issues of compromising users’ privacy.
Wei Liu   +6 more
wiley   +1 more source

Efficient and Provably Secure Certificateless Signature Schemes [PDF]

open access: yesJisuanji gongcheng, 2016
Certificateless public key cryptography solves the key escrow problem of identity-based cryptography.In common with identity-based cryptography,certificateless public key cryptography does not rely on certificate.Therefor,this paper references from the ...
TANG Yongli,WANG Feifei,YAN Xixi,LI Zichen
doaj   +1 more source

Authenticated Distributed Group Key Agreement Protocol Using Elliptic Curve Secret Sharing Scheme

open access: yesIEEE Access, 2023
One of the fundamental construction blocks in safeguarding group communications is group key establishment protocols. Group key agreement protocols are more suitable for distributed environments where the participant from various places can agree upon ...
Rolla Subrahmanyam   +2 more
doaj   +1 more source

Quantum resource estimates for computing elliptic curve discrete logarithms [PDF]

open access: yes, 2017
We give precise quantum resource estimates for Shor's algorithm to compute discrete logarithms on elliptic curves over prime fields. The estimates are derived from a simulation of a Toffoli gate network for controlled elliptic curve point addition ...
A Joux   +32 more
core   +2 more sources

An Efficient Pairing‐Free Certificateless Signature Scheme with KGC Trust Level 3 for Wireless Sensor Network

open access: yesWireless Communications and Mobile Computing, Volume 2023, Issue 1, 2023., 2023
With the widespread adoption of wireless sensor networks (WSN), the security of the WSN has been a wide concern. Certificateless signature eliminates the certificate management problem and key escrow problem and is considered a feasible solution to solve the data integrity and authentication of WSN. Recently, Thumbur et al.
Hong Zhao   +4 more
wiley   +1 more source

Secure authentication scheme in 6G‐enabled mobile Internet of things for online English education

open access: yesIET Networks, Volume 11, Issue 5, Page 182-194, September 2022., 2022
Abstract In recent years, the mobile Internet of Things (MIoT) for online English education has quickly become an important means and main tool for people to learn and communicate English due it has characteristics and advantages such as high efficiency and no geographical restrictions.
Jiming Yin, Jie Cui
wiley   +1 more source

Time‐Enabled and Verifiable Secure Search for Blockchain‐Empowered Electronic Health Record Sharing in IoT

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
The collection and sharing of electronic health records (EHRs) via the Internet of Things (IoT) can enhance the accuracy of disease diagnosis. However, it is challenging to guarantee the secure search of EHR during the sharing process. The advent of blockchain is a promising solution to address the issues, owing to its remarkable features such as ...
Xueli Nie   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy