Results 91 to 100 of about 5,722 (251)
Efficient Authenticated Encryption Schemes with Public Verifiability
An authenticated encryption scheme allows messages to be encrypted and authenticated simultaneously. In 2003, Ma and Chen proposed such a scheme with public verifiability.
Bao, Feng +3 more
core +2 more sources
Remote patient monitoring using safe and secure WBAN technology [PDF]
In the recent years, we have witnessed a tremendous growth and development in the field of wireless communication technology and sensors. Resulting into opening new dimensions in various research fields.
Ben Haj Frej, Mohamed +2 more
core
A Novel Provable Secured Signcryption Scheme ????: A Hyper-Elliptic Curve-Based Approach
Rivest, Shamir, & Adleman (RSA), bilinear pairing, and elliptic curve are well-known techniques/algorithms for security protocols. These techniques suffer from higher computation and communication costs due to increased sizes of parameters, public ...
Insaf Ullah +5 more
doaj +1 more source
Identity based cryptography from bilinear pairings [PDF]
This report contains an overview of two related areas of research in cryptography which have been prolific in significant advances in recent years. The first of these areas is pairing based cryptography.
Barbosa, Manuel
core
A Blockchain Based Privacy-Preserving Incentive Mechanism in Crowdsensing Applications
Crowdsensing applications utilize the pervasive smartphone users to collect large-scale sensing data efficiently. The quality of sensing data depends on the participation of highly skilled users.
Jingzhong Wang +5 more
doaj +1 more source
Secure communication mechanism for VSN based on certificateless signcryption
To solve the communication security problems of vehicular social network (VSN), an efficient certificateless signcryption scheme was proposed.The proposed scheme was proven secure in the random oracle model based on the computational Diffie-Hellman ...
Wenbo ZHANG, Wenhua HUANG, Jingyu FENG
doaj
A Traceable Ring Signcryption Scheme Based on SM9 for Privacy Protection
To address the issues of insufficient privacy protection, lack of confidentiality, and absence of traceability mechanisms in resource-constrained application scenarios such as IoT nodes or mobile network group communications, this paper proposes a ...
Liang Qiao, Xuefeng Zhang, Beibei Li
doaj +1 more source
Evidence acquisition in cloud forensics [PDF]
In this paper, we present a performance comparison between different digital evidence acquisition protocols in the cloud-computing environment.
Aslan, Heba +3 more
core
Two-way and anonymous heterogeneous signcryption scheme between PKI and IBC
Exiting heterogeneous signcryption schemes which were between public key infrastructure (PKI) and identity-based cryptosystem (IBC) have some limitations.A new heterogeneous signcryption scheme between PKI and IBC was proposed.In the random oracle mode ...
Cai-fen WANG +4 more
doaj +2 more sources
Security and efficiency remain a serious concern for Internet of Things (IoT) environments due to the resource-constrained nature and wireless communication.
J. Khan +4 more
semanticscholar +1 more source

