Results 281 to 290 of about 2,245,906 (352)
Some of the next articles are maybe not open access.
IEEE Transactions on Intelligent Vehicles, 2023
Vehicle-to-Grid (V2G) networks are potential solutions to addressing energy and environmental challenges, although security remains a key concern. For example, attackers may seek to obtain private information from frequent electricity/service exchanges ...
Yulin Liu +5 more
semanticscholar +3 more sources
Vehicle-to-Grid (V2G) networks are potential solutions to addressing energy and environmental challenges, although security remains a key concern. For example, attackers may seek to obtain private information from frequent electricity/service exchanges ...
Yulin Liu +5 more
semanticscholar +3 more sources
Certificateless Threshold Ring Signature
Information Sciences, 2009zbMATH Open Web Interface contents unavailable due to conflicting licenses.
chang, shuang +3 more
openaire +4 more sources
IEEE Transactions on Industrial Informatics
The Industrial Internet of Things (IIoT) has been widely studied, which dramatically enhanced the manufacturing efficiency and service elasticity.
Gang Xu +6 more
semanticscholar +3 more sources
The Industrial Internet of Things (IIoT) has been widely studied, which dramatically enhanced the manufacturing efficiency and service elasticity.
Gang Xu +6 more
semanticscholar +3 more sources
Anonymity-Enhanced Sequential Multi-Signer Ring Signature for Secure Medical Data Sharing in IoMT
IEEE Transactions on Information Forensics and SecurityInternet of Medical Things (IoMT) has garnered significant research attention from both academic and medical institutions. However, the sensitive medical data involved in IoMT raises security and privacy concerns.
Gang Xu +6 more
semanticscholar +3 more sources
An efficient multivariate threshold ring signature scheme
Computer Standards and Interfaces, 2021At CRYPTO 2011, Sakumoto et al. introduced the first 3-pass identification protocol with security reduction to the MQ problem and impersonation probability 2 3 . Petzoldt et al.
D. Duong +3 more
semanticscholar +3 more sources
Journal of Computer Science and Technology, 2007
Group signature allows the anonymity of a real signer in a group to be revoked by a trusted party called group manager. It also gives the group manager the absolute power of controlling the formation of the group. Ring signature, on the other hand, does not allow anyone to revoke the signer anonymity, while allowing the real signer to form a group ...
Liu, Dennis Y.W. +4 more
openaire +4 more sources
Group signature allows the anonymity of a real signer in a group to be revoked by a trusted party called group manager. It also gives the group manager the absolute power of controlling the formation of the group. Ring signature, on the other hand, does not allow anyone to revoke the signer anonymity, while allowing the real signer to form a group ...
Liu, Dennis Y.W. +4 more
openaire +4 more sources
LaRRS: Lattice-Based Revocable Ring Signature and Its Application for VANETs
IEEE Transactions on Vehicular TechnologyVehicular ad-hoc networks (VANETs) have drawn a lot of attention for their potential to improve traffic efficiency and safety. To deal with anonymous authentication and message integrity during communication, many protocols have been designed.
Jiaming Wen +5 more
semanticscholar +3 more sources
Concise RingCT Protocol Based on Linkable Threshold Ring Signature
IEEE Transactions on Dependable and Secure ComputingRing Confidential Transactions (RingCT) is a typical privacy-preserving protocol for blockchain, which is used for the most popular anonymous cryptocurrency Monero in recent years.
Junke Duan +5 more
semanticscholar +3 more sources
An efficient lattice-based linkable ring signature scheme with scalability to multiple layer
Journal of Ambient Intelligence and Humanized Computing, 2021Yan Ren, Haipeng Guan, Qiuxia Zhao
semanticscholar +3 more sources
Flexible Threshold Ring Signature in Chronological Order for Privacy Protection in Edge Computing
IEEE Transactions on Cloud Computing, 2022Edge computing can process data at the network edge rather than in the remote cloud. To protect the security of the collected data, blockchain can be used in edge computing.
Zhiwei Wang, Jiaxing Fan
semanticscholar +1 more source

