Results 101 to 110 of about 12,317,693 (236)

Blockchain-Based Data Access Control and Key Agreement System in IoT Environment. [PDF]

open access: yesSensors (Basel), 2023
Lee J   +6 more
europepmc   +1 more source

A Quantum-Resistant Identity Authentication and Key Agreement Scheme for UAV Networks Based on Kyber Algorithm

open access: yesDrones
Unmanned aerial vehicles (UAVs) play a critical role in various fields, including logistics, agriculture, and rescue operations. Effective identity authentication and key agreement schemes are vital for UAV networks to combat threats.
Tao Xia   +5 more
doaj   +1 more source

Preventing Witness Leakage in Adaptor Signatures

open access: yesIEEE Access
Adaptor signature schemes allow two parties to trade fairly. When a valid signature is revealed, the secret witness can also be extracted. This is useful in blockchain settings such as atomic swaps and fair exchange. However, if an adversary obtains both
Jen-Chieh Hsu, Raylin Tso
doaj   +1 more source

Home - About - Disclaimer - Privacy