Results 111 to 120 of about 1,920,406 (199)
Some of the next articles are maybe not open access.
Related searches:
Related searches:
IEEE Transactions on Intelligent Vehicles, 2023
Vehicle-to-Grid (V2G) networks are potential solutions to addressing energy and environmental challenges, although security remains a key concern. For example, attackers may seek to obtain private information from frequent electricity/service exchanges ...
Yulin Liu +5 more
semanticscholar +1 more source
Vehicle-to-Grid (V2G) networks are potential solutions to addressing energy and environmental challenges, although security remains a key concern. For example, attackers may seek to obtain private information from frequent electricity/service exchanges ...
Yulin Liu +5 more
semanticscholar +1 more source
Flexible Threshold Ring Signature in Chronological Order for Privacy Protection in Edge Computing
IEEE Transactions on Cloud Computing, 2022Edge computing can process data at the network edge rather than in the remote cloud. To protect the security of the collected data, blockchain can be used in edge computing.
Zhiwei Wang, Jiaxing Fan
semanticscholar +1 more source
Certificateless Threshold Ring Signature
Information Sciences, 2009zbMATH Open Web Interface contents unavailable due to conflicting licenses.
chang, shuang +3 more
openaire +2 more sources
A certificateless ring signature scheme based on lattice
Concurrency and Computation, 2022For the problems that ring signature needs key escrow, has some security risks, and cannot avoid malicious key generation center (KGC) in the post‐quantum era, we design a certificateless ring signature scheme based on lattice (L‐CRSS).
Songshou Dong +3 more
semanticscholar +1 more source
An efficient multivariate threshold ring signature scheme
Comput. Stand. Interfaces, 2021At CRYPTO 2011, Sakumoto et al. introduced the first 3-pass identification protocol with security reduction to the MQ problem and impersonation probability 2 3 . Petzoldt et al.
D. Duong +3 more
semanticscholar +1 more source
Journal of Electronics (China), 2008
Proxy signatures have been used to enable the transfer of digital signing power within some context and ring signatures can be used to provide the anonymity of a signer. By combining the functionalities of proxy signatures and ring signatures, this paper introduces a new concept, named ring proxy signature, which is a proxy signature generated by an ...
Baodian Wei +2 more
openaire +1 more source
Proxy signatures have been used to enable the transfer of digital signing power within some context and ring signatures can be used to provide the anonymity of a signer. By combining the functionalities of proxy signatures and ring signatures, this paper introduces a new concept, named ring proxy signature, which is a proxy signature generated by an ...
Baodian Wei +2 more
openaire +1 more source
IEEE Transactions on Dependable and Secure Computing, 2008
Ring signature was first introduced in 2001. In a ring signature, instead of revealing the actual identity of the message signer, it specifies a set of possible signers. The verifier can be convinced that the signature was indeed generated by one of the ring members, however, she is unable to tell which member actually produced the signature.
J. Ren, L. Harn
openaire +1 more source
Ring signature was first introduced in 2001. In a ring signature, instead of revealing the actual identity of the message signer, it specifies a set of possible signers. The verifier can be convinced that the signature was indeed generated by one of the ring members, however, she is unable to tell which member actually produced the signature.
J. Ren, L. Harn
openaire +1 more source

