Results 11 to 20 of about 1,436,143 (281)

Group-Signature and Group Session Key Combined Safety Message Authentication Protocol for VANETs

open access: yesIEEE Access, 2019
Anonymous authentication has significant contribution to privacy protection in safety message dissemination for Vehicular Ad Hoc Networks (VANETs); however, it suffers from heavy workload of vehicle revocation check and message signature verification ...
Chunhua Zhang   +4 more
doaj   +3 more sources

Reconstruction for the Signature of a Rough Path [PDF]

open access: yes, 2016
Recently it was proved that the group of rough paths modulo tree-like equivalence is isomorphic to the corresponding signature group through the signature map S (a generalized notion of taking iterated path integrals).
Geng, Xi
core   +2 more sources

Securing an Authenticated Privacy Preserving Protocol in a Group Signature Scheme Based on a Group Ring

open access: yesMathematics, 2023
Group signatures are a leading competing signature technique with a substantial amount of research. With group settings, group signatures provide user anonymity. Any group member with access to the group can generate a signature while remaining anonymous.
Nur Afiqah Suzelan Amir   +2 more
doaj   +1 more source

The mapping class group and the Meyer function for plane curves [PDF]

open access: yes, 1998
For each d>=2, the mapping class group for plane curves of degree d will be defined and it is proved that there exists uniquely the Meyer function on this group.
Blandford, RD   +11 more
core   +5 more sources

System for Anonymous Data Collection Based on Group Signature Scheme

open access: yesActa Universitatis Agriculturae et Silviculturae Mendelianae Brunensis, 2016
This paper deals with an anonymous data collection in the Internet of Things (IoT). the privacy and anonymity of the data source is important for many IoT applications, such as in agriculture, health, and automotive.
David Troják, Dan Komosný
doaj   +1 more source

A Privacy-Preserving Key Management Scheme with Support for Sybil Attack Detection in VANETs

open access: yesSensors, 2021
Vehicular ad hoc networks (VANETs) face two important and conflicting challenges with regards to security: preserve the privacy of vehicles in order to prevent malicious entities from tracking users and detect and remove bad actors that attempt to game ...
L. Ellen Funderburg, Im-Yeong Lee
doaj   +1 more source

On the origin of the difference between time and space [PDF]

open access: yes, 2004
We suggest that the difference between time and space is due to spontaneous symmetry breaking. In a theory with spinors the signature of the metric is related to the signature of the Lorentz-group.
B. S. De Witt   +8 more
core   +1 more source

Group–Proxy Signature Scheme: A Novel Solution to Electronic Cash

open access: yesJournal of Intelligent Systems, 2013
Proxy signature and group signature are two basic cryptographic primitives. Due to their valuable characteristics, many schemes have been put forward independently and they have been applied in many practical scenarios up to the present.
Bao Haiyong, Cao Zhenfu
doaj   +1 more source

SRCPR: SignReCrypting Proxy Re-Signature in Secure VANET Groups

open access: yesIEEE Access, 2018
Vehicular Ad hoc Network is an emerging area as a key component of the intelligent transport system. Despite the immense researches going on in this area, it is yet to be deployed at its full scale due to lack of trust, safety, and confidentiality in the
Sneha Kanchan, Narendra S. Chaudhari
doaj   +1 more source

Unique Group Signatures [PDF]

open access: yes, 2012
We initiate the study of unique group signature such that signatures of the same message by the same user will always have a large common component (i.e., unique identifier). It enables an efficient detection algorithm, revealing the identities of illegal users, which is fundamentally different from previous primitives.
Matthew Franklin, Haibin Zhang
openaire   +1 more source

Home - About - Disclaimer - Privacy