Results 21 to 30 of about 5,722 (251)

Signcryption schemes with threshold unsigncryption, and applications [PDF]

open access: yes, 2014
The final publication is available at link.springer.comThe goal of a signcryption scheme is to achieve the same functionalities as encryption and signature together, but in a more efficient way than encrypting and signing separately. To increase security
Herranz Sotoca, Javier   +2 more
core   +2 more sources

A trust‐based mechanism for drones in smart cities

open access: yesIET Smart Cities, Volume 4, Issue 4, Page 255-264, December 2022., 2022
Abstract Smart cities equipped with intelligent devices can enhance the lifestyle and quality of humans by automatically and collaboratively acting as a sustainable resource to the ecosystem. In addition, the technological advancement can be further empowered by interconnecting various types of technologies, such as IoT, Artificial Intelligence, drones
Geetanjali Rathee   +3 more
wiley   +1 more source

S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption, Pair Based Text Authentication, and Contactless Smartcard [PDF]

open access: yes, 2017
Nowadays, mobile banking becomes a popular tool which consumers can conduct financial transactions such as shopping, monitoring accounts balance, transferring funds and other payments.
Putra, Dea Saka Kurnia   +2 more
core   +2 more sources

An Edge‐Cloud Collaborative Cross‐Domain Identity‐Based Authentication Protocol with Privacy Protection

open access: yesChinese Journal of Electronics, Volume 31, Issue 4, Page 721-731, July 2022., 2022
Edge‐cloud collaborative application scenario is more complex, it involves collaborative operations among different security domains, frequently accessing and exiting application system of mobile terminals. A cross‐domain identity authentication protocol based on privacy protection is proposed. The main advantages of the protocol are as follows.
Haipeng SUN   +5 more
wiley   +1 more source

Improved Lattice-Based Signcryption in the Standard Model

open access: yesIEEE Access, 2019
Signcryption is a basic cryptographic primitive that simultaneously captures the functions of encryption and signature. To realize comprehensive information security against quantum computing attacks, lattice-based signcryption schemes have been ...
Xiaopeng Yang   +3 more
doaj   +1 more source

A secure data transmission and efficient data balancing approach for 5G‐based IoT data using UUDIS‐ECC and LSRHS‐CNN algorithms

open access: yesIET Communications, Volume 16, Issue 5, Page 571-583, March 2022., 2022
Abstract Due to the realization of 5G technology, the Internet of things (IoT) has made remarkable advancements in recent years. However, security along with data balancing issues is proffered owing to IoT data's growth. The universally unique identifier short input pseudo‐random (SiP) hash‐based elliptic curve cryptography (UUDIS‐ECC) centred secure ...
Kusum Yadav   +6 more
wiley   +1 more source

Smart Communication and Security by Key Distribution in Multicast Environment

open access: yesWireless Communications and Mobile Computing, Volume 2022, Issue 1, 2022., 2022
The service providers are aiming to provide multicast applications, primarily in the area of content delivery and secure wireless networks, due to the increased adoption of network systems and demand for secured wireless networks communication. Cryptography enables the users to send information across insecure networks using data encryption and ...
Manisha Yadav   +5 more
wiley   +1 more source

Anti-Quantum Signcryption Scheme Based on Niederreiter Cryptosystem [PDF]

open access: yesJisuanji gongcheng, 2020
To address security issues of network communication in the post-quantum era,this paper studies the Niederreiter cryptosystem in code-based cryptography,and combines the double public key cryptographic scheme based on the improved Niederreiter scheme with
WANG Zhong, HAN Yiliang
doaj   +1 more source

Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks

open access: yesThe Scientific World Journal, 2014
Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of ...
Yang Lu, Jiguo Li
doaj   +1 more source

Identity-Based Key-Insulated Signcryption [PDF]

open access: yesInformatica, 2012
Summary: Key-insulated cryptography is an important technique to protect private keys in identity-based (IB) cryptosytems. Despite the flurry of recent results on IB key-insulated encryption (IBKIE) and signature (IBKIS), a problem regarding the security and efficiency of practicing IBKIE and IBKIS as a joint IB key-insulated signature/encryption ...
Chen, Jianhong   +5 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy