Results 51 to 60 of about 4,167 (184)
Lightweight Authentication Scheme for Resource‐Constrained Devices in IIoT
An authentication scheme leveraging elliptic curve cryptography (ECC) and lightweight cryptography was proposed. This scheme is designed to facilitate secure communication among IIoT devices while minimizing resource usage. ABSTRACT The industrial Internet of Things (IIoT) involves interconnected devices and sensors that exchange data in resource ...
Zhong Cao +4 more
wiley +1 more source
Implementasi Algoritma ECDSA untuk Pengamanan E-Mail (Verifikasi Keaslian Pesan) [PDF]
This final project is discussed about implementation of digital signature on email delivery with java programming language. Digital signature is one of the cryptographic security services that provide assurance to the recipient of the message (receiver).
Prabowo, Pualam Sendi Agung +2 more
core
A Secure Way of Communication for Smart Grid Networks
In 2021, Khan et al. suggested a scheme based on smart grid networks. They deployed the random oracle model to justify the security of their scheme formally. They also verified the security of the scheme using the AVISPA software tool. We studied this scheme and found some security issues. The scheme suffers from a confidentiality breach attack.
Pooja Tyagi +4 more
wiley +1 more source
An Aggregate Signature Scheme Based on a Trapdoor Hash Function for the Internet of Things
With the rapid development of the Internet of Things (IoT), it becomes challenging to ensure its security. Identity authentication and integrity verification can be achieved by secure hash functions and digital signature algorithms for IoT applications ...
Hong Shu +5 more
doaj +1 more source
A Novel Blind Signature Based Upon ECDLP [PDF]
Encryption and decryption techniques protect the condentiality of information exchanged in a network whereas digital signature is electronic signing of data that provide senders authentication using its secret key and verication using its public key and
Chhotaray, Animesh Chhotaray +1 more
core
A Blockchain‐Based Certificateless Anonymous Cross‐Domain Authentication Scheme for IoV
As an essential component of the internet of things, the internet of vehicles (IoV) holds broad application prospects in areas such as safe driving, intelligent transportation, and service reservations. Due to the security and privacy requirements, anonymous authentication schemes are widely used in IoV. However, traditional certificate‐based anonymous
Hua Wang +5 more
wiley +1 more source
The Elliptic Curve Discrete Logarithm and Functional Graphs [PDF]
The discrete logarithm problem, and its adaptation to elliptic curves, called the elliptic curve discrete logarithm problem (ECDLP) is an open problem in the field of number theory, and its applications to modern cryptographic algorithms are numerous ...
Evans, Christopher J
core +1 more source
Multi‐hop anonymous payment channel network based on onion routing
To solve the payment channel network path privacy problem, we analyse the multi‐hop anonymous and privacy‐preserving payment channel network scheme and propose a multi‐hop anonymous payment channel network based on onion routing based on it. The scheme removes the routing assumptions of the original scheme, designs an onion routing‐based payment ...
Caimei Wang, Yudong Ren, Zhize Wu
wiley +1 more source
Quantum attacks on Bitcoin, and how to protect against them [PDF]
The key cryptographic protocols used to secure the internet and financial transactions of today are all susceptible to attack by the development of a sufficiently large quantum computer.
Aggarwal, Divesh +4 more
core +3 more sources
Named Data Networking (NDN) is a promising network architecture that differs from the traditional TCP/IP network, as it focuses on data rather than the host. A new secure model is required to provide the data‐oriented trust instead of the host‐oriented trust.
Bing Li +3 more
wiley +1 more source

