Results 191 to 200 of about 5,722 (251)
Some of the next articles are maybe not open access.
Position-based proxy signcryption
2015 IEEE/CIC International Conference on Communications in China (ICCC), 2015Position-based cryptography has attracted lots of researchers' attentions. In mobile Internet, there are lots of position based security applications. For the first time, one new conception, position-based proxy signcryption is proposed. Based on a secure positioning protocol, one model of position-based proxy signcryption is proposed.
Qingshui Xue +4 more
openaire +1 more source
IEEE Internet of Things Journal
With recent progress in Internet of Things technology, it is becoming more and more commonplace to use unmanned aerial vehicles (UAVs) for inconsiderable purposes.
Ikram Ali +5 more
semanticscholar +1 more source
With recent progress in Internet of Things technology, it is becoming more and more commonplace to use unmanned aerial vehicles (UAVs) for inconsiderable purposes.
Ikram Ali +5 more
semanticscholar +1 more source
Incrementally Executable Signcryptions
2014We present the concept of incrementally executable signcryptions, which is a generalization of traditional on-line/off-line signcryption and facilitates optimizing the sender’s off-line computation. With an incrementally executable signcryption scheme, the sender can activate signcryption process incrementally by its given sequential input: the sender ...
Dan Yamamoto +2 more
openaire +1 more source
Frontiers Comput. Sci.
A public key infrastructure-enabled system authentication model is developed to provide essential security functions for Vehicular ad hoc networks (VANETs). An intelligent transportation system is provided by VANET, an emerging technology.
M. Gayathri, C. Gomathy
semanticscholar +1 more source
A public key infrastructure-enabled system authentication model is developed to provide essential security functions for Vehicular ad hoc networks (VANETs). An intelligent transportation system is provided by VANET, an emerging technology.
M. Gayathri, C. Gomathy
semanticscholar +1 more source
An Efficient Multimode Certificateless Ring Signcryption Scheme in VANETs
IEEE Internet of Things JournalThe swift advancement of new energy vehicles and the integration of autonomous driving technologies have propelled vehicular ad hoc networks (VANETs) into a prominent research focus. Numerous privacy protection schemes have been proposed to ensure secure
Qibang Zhan, Ming Luo, Minrong Qiu
semanticscholar +1 more source
SSRN Electronic Journal, 2014
Signcryption is a recently newer technology that is still in the process of being developed and made completely efficient. The purpose is to take the previous sign then encrypt method but by killing two birds with one stone. The technology is a scheme which can produce secret and authenticated messages sent between different parties.
openaire +1 more source
Signcryption is a recently newer technology that is still in the process of being developed and made completely efficient. The purpose is to take the previous sign then encrypt method but by killing two birds with one stone. The technology is a scheme which can produce secret and authenticated messages sent between different parties.
openaire +1 more source
Identity-Based Proxy Signcryption Schemes
Applied Mechanics and Materials, 2012Identity-based encryption and signature schemes that allow any pair of users to communicate securely and to verify each other's signatures without verifying certificate. A signcryption is a primitive that provides the properties of both digital signatures and encryption schemes in a way that is more efficient than signing and encrypting separately ...
openaire +1 more source
Identity-based searchable attribute signcryption in lattice for a blockchain-based medical system
Frontiers of Information Technology & Electronic EngineeringElectronic healthcare systems can offer convenience but face the risk of data forgery and information leakage. To solve these issues, we propose an identity-based searchable attribute signcryption in lattice for a blockchain-based medical system (BCMS ...
Hui-fang Yu, Xiaoping Bai
semanticscholar +1 more source
ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message
2008In this paper, we propose a signcryption scheme which provides all the following properties at the same time. (1) forward security: the private key of a sender does not help any attack to break the confidentiality of any signcrypted message generated by the sender.
Raylin Tso +2 more
openaire +1 more source
On the Security of Multi-Receiver Certificateless Generalized Signcryption Scheme for WBANs
IEEE Transactions on Dependable and Secure ComputingIn Wireless body area networks (WBANs), the physiological parameters monitored by wearable devices are sensitive data of patients. To ensure the privacy of such data, Shen et al.
Chenghe Dong, Jianhong Zhang
semanticscholar +1 more source

