Results 71 to 80 of about 5,722 (251)

A survey on post‐quantum based approaches for edge computing security

open access: yesWIREs Computational Statistics, Volume 16, Issue 1, January/February 2024.
The distribution of reviewed papers by focused area. Abstract With the development of technology and its integration with scientific realities, computer systems continue to evolve as infrastructure. One of the most important obstacles in front of quantum computers with high‐speed processing is that its existing systems cause security vulnerabilities ...
Aykut Karakaya, Ahmet Ulu
wiley   +1 more source

Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols [PDF]

open access: yes, 2011
Cryptanalysis is an important branch in the study of cryptography, including both the classical cryptography and the quantum one. In this paper we analyze the security of two three-party quantum key distribution protocols (QKDPs) proposed recently, and ...
Gao, Fei   +3 more
core   +1 more source

Ensuring Security and Privacy in VANET: A Comprehensive Survey of Authentication Approaches

open access: yesJournal of Computer Networks and Communications, Volume 2024, Issue 1, 2024.
Vehicular ad hoc networks (VANET) are revolutionizing intelligent transportation systems (ITS), and as a result, research on their security is becoming increasingly important. As the primary security concern for VANET, authentication security is still quite difficult to achieve.
Soujanya B K   +2 more
wiley   +1 more source

Performance and Security Evaluations of Identity-and Pairing-based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, McCullagh and Quisquater, and Paterson and Schuldt [PDF]

open access: yes, 2018
Bilinear pairing, an essential tool to construct-efficient digital signatures, has applications in mobile devices and other applications. One particular research challenge is to design cross-platform security protocols (e.g.
Choo, Kim-Kwang Raymond   +4 more
core   +2 more sources

Enhancing Security in Smart Renewable Energy Grids Through Proxy Signcryption Approach

open access: yesJournal of Sensors, Volume 2024, Issue 1, 2024.
The rapid development of smart renewable energy grids (SREGs) has resulted in a vast amount of data that requires efficient access control and secure mechanisms for sharing energy records among stakeholders. This paper proposes a novel approach called the identity‐based proxy signcryption‐based scheme for SREGs (ID‐PSC‐SREGs), which ensures the secure ...
Rachana Y. Patil   +5 more
wiley   +1 more source

Leveled Fully Homomorphic Signcryption From Lattices

open access: yesIEEE Access, 2023
With the continuous and rapid development of Cloud Computing, Big Data and Internet of Things, it is extremely critical to protect data with homomorphism, privacy and integrity. For this, Rezaeibagha et al.
Xiaodan Jin   +4 more
doaj   +1 more source

An example of proving UC-realization with formal methods [PDF]

open access: yes, 2006
In the universal composability framework we consider ideal functionalities for secure messaging and signcryption. Using traditional formal methods techniques we show that the secure messaging functionality can be UC-realized by a hybrid protocol that ...
Andova, S.   +4 more
core   +2 more sources

Development of Time-Stamped Signcryption Scheme and its Application in E-Cash System [PDF]

open access: yes, 2013
A signcryption scheme combining public key encryptions and digital signatures in one logical step can simultaneously satisfy the security requirements of confidentiality, integrity, authenticity and non-repudiation and with a cost significantly lower ...
Baral, Sanjib Kumar, Dash, Sourav
core  

Multi-dimensional key generation of ICMetrics for cloud computing [PDF]

open access: yes, 2015
Despite the rapid expansion and uptake of cloud based services, lack of trust in the provenance of such services represents a significant inhibiting factor in the further expansion of such service.
Haciosman, Mustafa   +3 more
core   +2 more sources

Traceable attribute‐based signcryption [PDF]

open access: yesSecurity and Communication Networks, 2013
ABSTRACTSigncryption can provide confidentiality and authenticity for many cryptographic applications. In this study, we propose a new efficient attribute‐based signcryption scheme. This scheme achieves confidentiality against chosen ciphertext attacks and unforgeability against chosen messages attacks in the selective attribute model. In addition, our
Jianghong Wei, Xuexian Hu, Wenfen Liu
openaire   +1 more source

Home - About - Disclaimer - Privacy