Results 41 to 50 of about 423 (151)

Holistic Air Protection Scheme of ADS-B Communication

open access: yesIEEE Access, 2019
The avionics world is making the transition in the coming years to the automatic dependent surveillance-broadcast (ADS-B) communication in order to determine parameters like for instance position and velocity of the aircraft in the air. The standard does
An Braeken
doaj   +1 more source

Pavement Management Utilizing Mobile Crowd Sensing

open access: yesAdvances in Civil Engineering, Volume 2020, Issue 1, 2020., 2020
Pavement management, which is vital in road transportation and maintenance, is facing some troubles, such as high costs of labors and machineries, low detecting efficiency, and low update rate of pavement conditions by means of traditional detection ways.
Boquan Tian   +4 more
wiley   +1 more source

An Efficient Certificateless Generalized Signcryption Scheme

open access: yesSecurity and Communication Networks, 2018
Generalized signcryption can adaptively work as an encryption scheme, a signature scheme, or a signcryption scheme with only one algorithm. The paper proposes an efficient certificateless generic signcryption scheme without utilizing bilinear pairing operations.
Bo Zhang, Zhongtian Jia, Chuan Zhao
openaire   +1 more source

Optimal Adaptive Genetic Algorithm Based Hybrid Signcryption Algorithm for Information Security [PDF]

open access: yes, 2015
The functions of digital signature and public key encryption are simultaneously fulfilled by signcryption, which is a cryptographic primitive. To securely communicate very large messages, the cryptographic primitive called signcryption efficiently ...
B. Ramakrishnan   +3 more
core   +2 more sources

Enhanced Biometric Recognition for Secure Authentication Using Iris Preprocessing and Hyperelliptic Curve Cryptography

open access: yesWireless Communications and Mobile Computing, Volume 2020, Issue 1, 2020., 2020
Biometrics combined with cryptography can be employed to solve the conceptual and factual identity frauds in digital authentication. Biometric traits are proven to provide enhanced security for detecting crimes because of its interesting features such as accuracy, stability, and uniqueness.
Vani Rajasekar   +3 more
wiley   +1 more source

A Lightweight Nature Heterogeneous Generalized Signcryption (HGSC) Scheme for Named Data Networking‐Enabled Internet of Things

open access: yesWireless Communications and Mobile Computing, Volume 2020, Issue 1, 2020., 2020
Internet of Things (IoT) is the collection of different types of smart objects like mobile phones, sensors, cars, smart cities, smart buildings, and healthcare, which can provide a quality life to humans around the globe. These smart objects sense and produce a huge amount of data for distribution.
Manazara Rehman   +9 more
wiley   +1 more source

Efficient and Secure Key Management and Authentication Scheme for WBSNs Using CP-ABE and Consortium Blockchain [PDF]

open access: yes, 2022
publishedVersio
Al-Aidroos, Naziha   +6 more
core   +2 more sources

LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments

open access: yes, 2008
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile ...
Beheshti, A. A., Toorani, M.
core   +3 more sources

Lagrangian Recurrent Steganalysis and Hyper Elliptic Certificateless Signcryption for Secure Image Transmission [PDF]

open access: yes, 2023
Present-day evolution in communication and information technology dispenses straightforward and effortless access to data, but the most noteworthy condition is the formation of secure communication.
Ansari, J. Shaik Dawood, Tamilselvan, P.
core   +1 more source

Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings [PDF]

open access: yesSecurity and Communication Networks, 2017
Generalized signcryption (GSC) can be applied as an encryption scheme, a signature scheme, or a signcryption scheme with only one algorithm and one key pair. A key-insulated mechanism can resolve the private key exposure problem. To ensure the security of cloud storage, we introduce the key-insulated mechanism into GSC and propose a concrete scheme ...
Caixue Zhou   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy