Results 91 to 100 of about 1,315,010 (177)

Efficient And Secure Hop-By-Hop Message Authentication And Source Privacy In Wireless Sensor Networks [PDF]

open access: yes, 2015
security to the data is actually provided by an authentication. Authentication involves a process of confirming an identity. In Wireless sensor networks a lot of message authentication schemes have been developed, based on symmetric-key cryptosystems or ...
Bharatha Lakshmi, N. Vijaya   +1 more
core  

Fast and Proven Secure Blind Identity-Based Signcryption from Pairings [PDF]

open access: yes, 2004
We present the first blind identity-based signcryption (BIBSC). We formulate its security model and define the security notions of blindness and parallel one-more unforgeability (p1m-uf).
Tsz Hon Yuen, Victor K. Wei
core  

A Verifiable Ring Signature Scheme of Anonymous Signcryption Using ECC [PDF]

open access: yesInternational Journal of Mathematical Sciences and Computing, 2021
Pratik Gupta, Manoj Kumar
openaire   +1 more source

Identity based ring signcryption schemes revisited

open access: yesIdentity based ring signcryption schemes revisited
Ring Signcryption is used to provide a graceful way to leak trustworthy secrets in an anonymous, authenticated and confidential way. To the best of our knowledge, seven identity based ring signcryption schemes were reported in the literature. In this paper, we show that five of them are insecure in one or the other way. We then propose a new scheme and
openaire  

Addressing the Challenges of Electronic Health Records Using Blockchain and IPFS. [PDF]

open access: yesSensors (Basel), 2022
Pilares ICA   +4 more
europepmc   +1 more source

The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges-A Systematic Literature Review (SLR).

open access: yesComput Intell Neurosci, 2022
Hassan J   +6 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy