Results 31 to 40 of about 423 (151)

Lightweight certificateless and provably-secure signcryptosystem for the internet of things [PDF]

open access: yes, 2015
International audienceIn this paper, we propose an elliptic curve-based signcryption scheme derived from the standardized signature KCDSA (Korean Certificate-based Digital Signature Algorithm) in the context of the Internet of Things.
Laurent, Maryline   +2 more
core   +2 more sources

Novel lightweight signcryption-based key distribution mechanisms for MIKEY [PDF]

open access: yes, 2016
Part 1: Authentication and Key ManagementInternational audienceMultimedia Internet KEYing (MIKEY) is a standard key management protocol, used to set up common secrets between any two parties for multiple scenarios of communications.
Laurent, Maryline   +2 more
core   +3 more sources

An Efficient Online/Offline Signcryption Scheme for Internet of Things in Smart Home [PDF]

open access: yes, 2022
publishedVersio
Alabrah, Amerah   +6 more
core   +1 more source

On the joint security of signature and encryption schemes under randomness reuse: efficiency and security amplification [PDF]

open access: yes, 2012
Lecture Notes in Computer Science, 7341We extend the work of Bellare, Boldyreva and Staddon on the systematic analysis of randomness reuse to construct multi-recipient encryption schemes to the case where randomness is reused across different ...
C.H. Tan   +13 more
core   +3 more sources

Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols [PDF]

open access: yes, 2011
Cryptanalysis is an important branch in the study of cryptography, including both the classical cryptography and the quantum one. In this paper we analyze the security of two three-party quantum key distribution protocols (QKDPs) proposed recently, and ...
Gao, Fei   +3 more
core   +1 more source

Generalized Hierarchical Identity-Based Signcryption

open access: yesJournal of Computers, 2010
In this paper, we propose a generic method to construct Hierarchical Identity-Based Signcryption scheme. Using this method, a Hierarchical Identity-Based Signcryption scheme can be converted from any Hierarchical Identity-Based Encryption scheme. Then, we give a concrete instantiation, which is the first constant-size fully secure hierarchical identity-
Hao Wang, Qiuliang Xu, Xiufeng Zhao
openaire   +1 more source

Smart Antennas and Intelligent Sensors Based Systems: Enabling Technologies and Applications, 2020

open access: yes, 2022
Wireless Communications and Mobile Computing, Volume 2022, Issue 1, 2022.
Fawad Zaman   +4 more
wiley   +1 more source

Distributed Secure Computing for Smart Mobile IoT Networks

open access: yes, 2022
Mobile Information Systems, Volume 2022, Issue 1, 2022.
Vishal Sharma   +5 more
wiley   +1 more source

Policy-Controlled Authenticated Access to LLN-Connected Healthcare Resources. [PDF]

open access: yes, 2018
Ubiquitous devices comprising several resource-constrained nodes with sensors, actuators, and networking capabilities are becoming part of many solutions that seek to enhance user's environment smartness and quality of living, prominently including ...
Askoxylakis Ioannis G.()   +5 more
core   +1 more source

Fine-Grained Access Control Aware Multi-User Data Sharing with Secure Keyword Search [PDF]

open access: yes, 2014
We consider the problems of access control and encrypted keyword search for cryptographic cloud storage in such a way that they can be implemented for a multiple users setting.
NISHIDE Takashi   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy