Results 41 to 50 of about 1,315,010 (177)

[Retracted] An Artificial Intelligence Mechanism for the Prediction of Signal Strength in Drones to IoT Devices in Smart Cities

open access: yesAdvances in Materials Science and Engineering, Volume 2022, Issue 1, 2022., 2022
Drones, the Internet of Things (IoT), and Artificial Intelligence (AI) could be used to create extraordinary responses to today’s difficulties in smart city challenges. A drone, which would be effectively a data‐gathering device, could approach regions that become complicated, dangerous, or even impossible to achieve for individuals.
Mohamad Reda A. Refaai   +6 more
wiley   +1 more source

The Insecurity of Two Proxy Signcryption Schemes: Proxy Credential Forgery Attack and How to Prevent It [PDF]

open access: yes, 2014
Securing different online e-business activities usually requires applying different cryptographic algorithms. The proxy signcryption algorithms are designed for applications such as online proxy auction or online proxy signatures on business contracts ...
Yeh, Jyh-haw
core   +2 more sources

A Novel Forensic Readiness Framework Applicable to the Drone Forensics Field

open access: yesComputational Intelligence and Neuroscience, Volume 2022, Issue 1, 2022., 2022
The Drone Forensics (DRFs) field is a branch of digital forensics, which involves the identification, capture, preservation, reconstruction, analysis, and documentation of drone incidents. Several models have been proposed in the literature for the DRF field, which generally discusses DRF from a reactive forensic perspective; however, the proactive ...
Fahad Mazaed Alotaibi   +3 more
wiley   +1 more source

Identity-based edge computing anonymous authentication protocol [PDF]

open access: yes, 2023
With the development of sensor technology and wireless communication technology, edge computing has a wider range of applications. The privacy protection of edge computing is of great significance.
Kang, Naixin   +4 more
core   +2 more sources

ON THE SECURITY OF TWO RING SIGNCRYPTION SCHEMES [PDF]

open access: yesProceedings of the International Conference on Security and Cryptography, 2009
Ring signcryption is a cryptographic primitive, that allows an user to send a message in confidential, authentic and anonymous way, i.e. the recipient of the message is convinced that the message is valid and it comes from one of the ring member, but ...
C. Pandu Rangan   +2 more
openaire   +3 more sources

Improved Lattice-Based Signcryption in the Standard Model

open access: yesIEEE Access, 2019
Signcryption is a basic cryptographic primitive that simultaneously captures the functions of encryption and signature. To realize comprehensive information security against quantum computing attacks, lattice-based signcryption schemes have been ...
Xiaopeng Yang   +3 more
doaj   +1 more source

Privacy-Enhancing Group Signcryption Scheme [PDF]

open access: yes, 2021
In the last decades, several signcryption schemes have been developed for different privacy-enhancing purposes. In this paper, we propose a new privacy-enhancing group signcryption schemethat provides: unforgeability, confidentiality, ciphertext and ...
Dzurenda, Petr   +3 more
core   +2 more sources

An efficient signcryption scheme with key privacy and its extension to ring signcryption

open access: yesJournal of Computer Security, 2010
In Information Processing Letters (2006), Tan pointed out that the anonymous signcryption scheme proposed by Yang, Wong and Deng (YWD) in ISC 2005 provides neither confidentiality nor anonymity. However, no discussion has been made on how a secure scheme can be made and there is no secure scheme available to date.
LI, Chung Ki   +4 more
openaire   +2 more sources

Trusted Cameras on Mobile Devices Based on SRAM Physically Unclonable Functions [PDF]

open access: yes, 2018
Nowadays, there is an increasing number of cameras placed on mobile devices connected to the Internet. Since these cameras acquire and process sensitive and vulnerable data in applications such as surveillance or monitoring, security is essential to ...
Arcenegui, Javier   +3 more
core   +1 more source

A Survey on Two New Secure and Efficient Data Transmission Protocols SET-IBS and SET-IBOOS for WSN [PDF]

open access: yes, 2015
Data transmission in a secure way is a critical issue for wireless sensor networks (WSNs). Clustering is an effective and practical way to enhance the system performance of WSNs.
, Roshima.P.P, Ramakrishna.M
core   +2 more sources

Home - About - Disclaimer - Privacy