Results 191 to 200 of about 5,722 (251)
Some of the next articles are maybe not open access.

Position-based proxy signcryption

2015 IEEE/CIC International Conference on Communications in China (ICCC), 2015
Position-based cryptography has attracted lots of researchers' attentions. In mobile Internet, there are lots of position based security applications. For the first time, one new conception, position-based proxy signcryption is proposed. Based on a secure positioning protocol, one model of position-based proxy signcryption is proposed.
Qingshui Xue   +4 more
openaire   +1 more source

IOOSC-U2G: An Identity-Based Online/Offline Signcryption Scheme for Unmanned Aerial Vehicle to Ground Station Communication

IEEE Internet of Things Journal
With recent progress in Internet of Things technology, it is becoming more and more commonplace to use unmanned aerial vehicles (UAVs) for inconsiderable purposes.
Ikram Ali   +5 more
semanticscholar   +1 more source

Incrementally Executable Signcryptions

2014
We present the concept of incrementally executable signcryptions, which is a generalization of traditional on-line/off-line signcryption and facilitates optimizing the sender’s off-line computation. With an incrementally executable signcryption scheme, the sender can activate signcryption process incrementally by its given sequential input: the sender ...
Dan Yamamoto   +2 more
openaire   +1 more source

Design of CSKAS-VANET model for stable clustering and authentication scheme using RBMA and signcryption

Frontiers Comput. Sci.
A public key infrastructure-enabled system authentication model is developed to provide essential security functions for Vehicular ad hoc networks (VANETs). An intelligent transportation system is provided by VANET, an emerging technology.
M. Gayathri, C. Gomathy
semanticscholar   +1 more source

An Efficient Multimode Certificateless Ring Signcryption Scheme in VANETs

IEEE Internet of Things Journal
The swift advancement of new energy vehicles and the integration of autonomous driving technologies have propelled vehicular ad hoc networks (VANETs) into a prominent research focus. Numerous privacy protection schemes have been proposed to ensure secure
Qibang Zhan, Ming Luo, Minrong Qiu
semanticscholar   +1 more source

Security with Signcryption

SSRN Electronic Journal, 2014
Signcryption is a recently newer technology that is still in the process of being developed and made completely efficient. The purpose is to take the previous sign then encrypt method but by killing two birds with one stone. The technology is a scheme which can produce secret and authenticated messages sent between different parties.
openaire   +1 more source

Identity-Based Proxy Signcryption Schemes

Applied Mechanics and Materials, 2012
Identity-based encryption and signature schemes that allow any pair of users to communicate securely and to verify each other's signatures without verifying certificate. A signcryption is a primitive that provides the properties of both digital signatures and encryption schemes in a way that is more efficient than signing and encrypting separately ...
openaire   +1 more source

Identity-based searchable attribute signcryption in lattice for a blockchain-based medical system

Frontiers of Information Technology & Electronic Engineering
Electronic healthcare systems can offer convenience but face the risk of data forgery and information leakage. To solve these issues, we propose an identity-based searchable attribute signcryption in lattice for a blockchain-based medical system (BCMS ...
Hui-fang Yu, Xiaoping Bai
semanticscholar   +1 more source

ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message

2008
In this paper, we propose a signcryption scheme which provides all the following properties at the same time. (1) forward security: the private key of a sender does not help any attack to break the confidentiality of any signcrypted message generated by the sender.
Raylin Tso   +2 more
openaire   +1 more source

On the Security of Multi-Receiver Certificateless Generalized Signcryption Scheme for WBANs

IEEE Transactions on Dependable and Secure Computing
In Wireless body area networks (WBANs), the physiological parameters monitored by wearable devices are sensitive data of patients. To ensure the privacy of such data, Shen et al.
Chenghe Dong, Jianhong Zhang
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy