Results 41 to 50 of about 423 (151)
Holistic Air Protection Scheme of ADS-B Communication
The avionics world is making the transition in the coming years to the automatic dependent surveillance-broadcast (ADS-B) communication in order to determine parameters like for instance position and velocity of the aircraft in the air. The standard does
An Braeken
doaj +1 more source
Pavement Management Utilizing Mobile Crowd Sensing
Pavement management, which is vital in road transportation and maintenance, is facing some troubles, such as high costs of labors and machineries, low detecting efficiency, and low update rate of pavement conditions by means of traditional detection ways.
Boquan Tian +4 more
wiley +1 more source
An Efficient Certificateless Generalized Signcryption Scheme
Generalized signcryption can adaptively work as an encryption scheme, a signature scheme, or a signcryption scheme with only one algorithm. The paper proposes an efficient certificateless generic signcryption scheme without utilizing bilinear pairing operations.
Bo Zhang, Zhongtian Jia, Chuan Zhao
openaire +1 more source
Optimal Adaptive Genetic Algorithm Based Hybrid Signcryption Algorithm for Information Security [PDF]
The functions of digital signature and public key encryption are simultaneously fulfilled by signcryption, which is a cryptographic primitive. To securely communicate very large messages, the cryptographic primitive called signcryption efficiently ...
B. Ramakrishnan +3 more
core +2 more sources
Biometrics combined with cryptography can be employed to solve the conceptual and factual identity frauds in digital authentication. Biometric traits are proven to provide enhanced security for detecting crimes because of its interesting features such as accuracy, stability, and uniqueness.
Vani Rajasekar +3 more
wiley +1 more source
Internet of Things (IoT) is the collection of different types of smart objects like mobile phones, sensors, cars, smart cities, smart buildings, and healthcare, which can provide a quality life to humans around the globe. These smart objects sense and produce a huge amount of data for distribution.
Manazara Rehman +9 more
wiley +1 more source
Efficient and Secure Key Management and Authentication Scheme for WBSNs Using CP-ABE and Consortium Blockchain [PDF]
publishedVersio
Al-Aidroos, Naziha +6 more
core +2 more sources
LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile ...
Beheshti, A. A., Toorani, M.
core +3 more sources
Lagrangian Recurrent Steganalysis and Hyper Elliptic Certificateless Signcryption for Secure Image Transmission [PDF]
Present-day evolution in communication and information technology dispenses straightforward and effortless access to data, but the most noteworthy condition is the formation of secure communication.
Ansari, J. Shaik Dawood, Tamilselvan, P.
core +1 more source
Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings [PDF]
Generalized signcryption (GSC) can be applied as an encryption scheme, a signature scheme, or a signcryption scheme with only one algorithm and one key pair. A key-insulated mechanism can resolve the private key exposure problem. To ensure the security of cloud storage, we introduce the key-insulated mechanism into GSC and propose a concrete scheme ...
Caixue Zhou +3 more
openaire +1 more source

