Results 81 to 90 of about 5,816 (214)

zk‐STARKs based scheme for sealed auctions in chains

open access: yesIET Blockchain, Volume 4, Issue 4, Page 344-354, December 2024.
This paper proposes a novel on‐chain sealed auction scheme based on zk‐STARKs, leveraging blockchain's decentralization and immutability to enhance auction security and efficiency. Experimental results demonstrate significant reductions in verification time, making the scheme highly suitable for large‐scale auction scenarios.
Li Wei, Liang Peili, Li Fei
wiley   +1 more source

A literature review on V2X communications security: Foundation, solutions, status, and future

open access: yesIET Communications, Volume 18, Issue 20, Page 1683-1715, December 2024.
The article first introduces the development history of the past Internet of Vehicles(IoV), summarizes some common V2X security threats, describes the development and application of the SM commercial algorithm in recent years, and finally, statistics and introduces the part of the development process of the security protocols currently used in IoV ...
Zuobin Ying   +3 more
wiley   +1 more source

Certificateless strong designated verifier multi-signature

open access: yesTongxin xuebao, 2016
In order to satisfy the application requirements in the fields of judicial administration,e-government,etc.,the definition and security model for certificateless strong designated verifier multi-signature were proposed.Then,the first certificateless ...
Hong-zhen DU, Qiao-yan WEN
doaj  

Ubic: Bridging the gap between digital cryptography and the physical world

open access: yes, 2014
Advances in computing technology increasingly blur the boundary between the digital domain and the physical world. Although the research community has developed a large number of cryptographic primitives and has demonstrated their usability in all ...
D.M. Freeman   +6 more
core   +1 more source

Quantum calculi and formalisms for system and network security: A bibliographic insights and synoptic review

open access: yesIET Quantum Communication, Volume 5, Issue 4, Page 486-515, December 2024.
Quantum calculi and formalisms aid in designing and analysing new cryptographic protocols for blockchain, assessing the feasibility and security of quantum algorithms, and building a quantum‐safe blockchain system. Bibliometric analysis is performed using R language and automated tools to identify key institutions, authors, organisations, and ...
Adarsh Kumar   +2 more
wiley   +1 more source

Quantum blockchain: Trends, technologies, and future directions

open access: yesIET Quantum Communication, Volume 5, Issue 4, Page 516-542, December 2024.
This article surveys the current state of blockchain technology, emphasising its security, authentication protocols, AI integration, and the emerging field of quantum blockchain. It highlights how quantum computing can enhance blockchain security and the necessity for quantum‐resistant designs to ensure the robustness of blockchain networks against ...
Manjula Gandhi S   +15 more
wiley   +1 more source

Closing the loop of SIEM analysis to Secure Critical Infrastructures [PDF]

open access: yes, 2014
Critical Infrastructure Protection is one of the main challenges of last years. Security Information and Event Management (SIEM) systems are widely used for coping with this challenge.
Di Sarno, Cesario   +4 more
core   +1 more source

Reconsidering Forgiveness and Unforgiveness: A Call for a More Nuanced Understanding of Unforgiveness

open access: yesSocial and Personality Psychology Compass
ABSTRACT This essay explores the complex nature of forgiveness and unforgiveness as responses to wrongdoing. Traditionally, forgiveness has been framed as a process that promotes psychological and relational well‐being, whereas unforgiveness is often viewed as harmful.
Susan D. Boon   +2 more
openaire   +1 more source

Post quantum proxy signature scheme based on the multivariate public key cryptographic signature

open access: yesInternational Journal of Distributed Sensor Networks, 2020
Proxy signature is a very useful technique which allows the original signer to delegate the signing capability to a proxy signer to perform the signing operation.
Jiahui Chen   +6 more
doaj   +1 more source

Certificateless Anonymous Authentication Scheme Supporting Illegal Signatures Localization for Internet of Vehicles [PDF]

open access: yesJisuanji gongcheng
In the Internet of Vehicles (IoV) environment, vehicles are connected to public networks through the Internet and information is vulnerable to various malicious attacks from attackers during transmission.
YANG Xiaodong, LI Muzi, MA Guozu, LI Songyu, WANG Caifen
doaj   +1 more source

Home - About - Disclaimer - Privacy