Results 91 to 100 of about 5,722 (251)

Efficient Authenticated Encryption Schemes with Public Verifiability

open access: yes, 2004
An authenticated encryption scheme allows messages to be encrypted and authenticated simultaneously. In 2003, Ma and Chen proposed such a scheme with public verifiability.
Bao, Feng   +3 more
core   +2 more sources

Remote patient monitoring using safe and secure WBAN technology [PDF]

open access: yes, 2016
In the recent years, we have witnessed a tremendous growth and development in the field of wireless communication technology and sensors. Resulting into opening new dimensions in various research fields.
Ben Haj Frej, Mohamed   +2 more
core  

A Novel Provable Secured Signcryption Scheme ????: A Hyper-Elliptic Curve-Based Approach

open access: yesMathematics, 2019
Rivest, Shamir, & Adleman (RSA), bilinear pairing, and elliptic curve are well-known techniques/algorithms for security protocols. These techniques suffer from higher computation and communication costs due to increased sizes of parameters, public ...
Insaf Ullah   +5 more
doaj   +1 more source

Identity based cryptography from bilinear pairings [PDF]

open access: yes, 2005
This report contains an overview of two related areas of research in cryptography which have been prolific in significant advances in recent years. The first of these areas is pairing based cryptography.
Barbosa, Manuel
core  

A Blockchain Based Privacy-Preserving Incentive Mechanism in Crowdsensing Applications

open access: yesIEEE Access, 2018
Crowdsensing applications utilize the pervasive smartphone users to collect large-scale sensing data efficiently. The quality of sensing data depends on the participation of highly skilled users.
Jingzhong Wang   +5 more
doaj   +1 more source

Secure communication mechanism for VSN based on certificateless signcryption

open access: yesTongxin xuebao, 2021
To solve the communication security problems of vehicular social network (VSN), an efficient certificateless signcryption scheme was proposed.The proposed scheme was proven secure in the random oracle model based on the computational Diffie-Hellman ...
Wenbo ZHANG, Wenhua HUANG, Jingyu FENG
doaj  

A Traceable Ring Signcryption Scheme Based on SM9 for Privacy Protection

open access: yesInformation
To address the issues of insufficient privacy protection, lack of confidentiality, and absence of traceability mechanisms in resource-constrained application scenarios such as IoT nodes or mobile network group communications, this paper proposes a ...
Liang Qiao, Xuefeng Zhang, Beibei Li
doaj   +1 more source

Evidence acquisition in cloud forensics [PDF]

open access: yes, 2017
In this paper, we present a performance comparison between different digital evidence acquisition protocols in the cloud-computing environment.
Aslan, Heba   +3 more
core  

Two-way and anonymous heterogeneous signcryption scheme between PKI and IBC

open access: yesTongxin xuebao, 2017
Exiting heterogeneous signcryption schemes which were between public key infrastructure (PKI) and identity-based cryptosystem (IBC) have some limitations.A new heterogeneous signcryption scheme between PKI and IBC was proposed.In the random oracle mode ...
Cai-fen WANG   +4 more
doaj   +2 more sources

Cost-Effective Signcryption for Securing IoT: A Novel Signcryption Algorithm Based on Hyperelliptic Curves

open access: yesInf.
Security and efficiency remain a serious concern for Internet of Things (IoT) environments due to the resource-constrained nature and wireless communication.
J. Khan   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy