Results 81 to 90 of about 5,816 (214)
zk‐STARKs based scheme for sealed auctions in chains
This paper proposes a novel on‐chain sealed auction scheme based on zk‐STARKs, leveraging blockchain's decentralization and immutability to enhance auction security and efficiency. Experimental results demonstrate significant reductions in verification time, making the scheme highly suitable for large‐scale auction scenarios.
Li Wei, Liang Peili, Li Fei
wiley +1 more source
A literature review on V2X communications security: Foundation, solutions, status, and future
The article first introduces the development history of the past Internet of Vehicles(IoV), summarizes some common V2X security threats, describes the development and application of the SM commercial algorithm in recent years, and finally, statistics and introduces the part of the development process of the security protocols currently used in IoV ...
Zuobin Ying +3 more
wiley +1 more source
Certificateless strong designated verifier multi-signature
In order to satisfy the application requirements in the fields of judicial administration,e-government,etc.,the definition and security model for certificateless strong designated verifier multi-signature were proposed.Then,the first certificateless ...
Hong-zhen DU, Qiao-yan WEN
doaj
Ubic: Bridging the gap between digital cryptography and the physical world
Advances in computing technology increasingly blur the boundary between the digital domain and the physical world. Although the research community has developed a large number of cryptographic primitives and has demonstrated their usability in all ...
D.M. Freeman +6 more
core +1 more source
Quantum calculi and formalisms aid in designing and analysing new cryptographic protocols for blockchain, assessing the feasibility and security of quantum algorithms, and building a quantum‐safe blockchain system. Bibliometric analysis is performed using R language and automated tools to identify key institutions, authors, organisations, and ...
Adarsh Kumar +2 more
wiley +1 more source
Quantum blockchain: Trends, technologies, and future directions
This article surveys the current state of blockchain technology, emphasising its security, authentication protocols, AI integration, and the emerging field of quantum blockchain. It highlights how quantum computing can enhance blockchain security and the necessity for quantum‐resistant designs to ensure the robustness of blockchain networks against ...
Manjula Gandhi S +15 more
wiley +1 more source
Closing the loop of SIEM analysis to Secure Critical Infrastructures [PDF]
Critical Infrastructure Protection is one of the main challenges of last years. Security Information and Event Management (SIEM) systems are widely used for coping with this challenge.
Di Sarno, Cesario +4 more
core +1 more source
ABSTRACT This essay explores the complex nature of forgiveness and unforgiveness as responses to wrongdoing. Traditionally, forgiveness has been framed as a process that promotes psychological and relational well‐being, whereas unforgiveness is often viewed as harmful.
Susan D. Boon +2 more
openaire +1 more source
Post quantum proxy signature scheme based on the multivariate public key cryptographic signature
Proxy signature is a very useful technique which allows the original signer to delegate the signing capability to a proxy signer to perform the signing operation.
Jiahui Chen +6 more
doaj +1 more source
Certificateless Anonymous Authentication Scheme Supporting Illegal Signatures Localization for Internet of Vehicles [PDF]
In the Internet of Vehicles (IoV) environment, vehicles are connected to public networks through the Internet and information is vulnerable to various malicious attacks from attackers during transmission.
YANG Xiaodong, LI Muzi, MA Guozu, LI Songyu, WANG Caifen
doaj +1 more source

