Results 81 to 90 of about 5,707 (192)

A literature review on V2X communications security: Foundation, solutions, status, and future

open access: yesIET Communications, Volume 18, Issue 20, Page 1683-1715, December 2024.
The article first introduces the development history of the past Internet of Vehicles(IoV), summarizes some common V2X security threats, describes the development and application of the SM commercial algorithm in recent years, and finally, statistics and introduces the part of the development process of the security protocols currently used in IoV ...
Zuobin Ying   +3 more
wiley   +1 more source

Quantum calculi and formalisms for system and network security: A bibliographic insights and synoptic review

open access: yesIET Quantum Communication, Volume 5, Issue 4, Page 486-515, December 2024.
Quantum calculi and formalisms aid in designing and analysing new cryptographic protocols for blockchain, assessing the feasibility and security of quantum algorithms, and building a quantum‐safe blockchain system. Bibliometric analysis is performed using R language and automated tools to identify key institutions, authors, organisations, and ...
Adarsh Kumar   +2 more
wiley   +1 more source

Implementation vulnerabilities in general quantum cryptography

open access: yes, 2018
Quantum cryptography is information-theoretically secure owing to its solid basis in quantum mechanics. However, generally, initial implementations with practical imperfections might open loopholes, allowing an eavesdropper to compromise the security of ...
Andersson, Erika   +3 more
core   +1 more source

Reconsidering Forgiveness and Unforgiveness: A Call for a More Nuanced Understanding of Unforgiveness

open access: yesSocial and Personality Psychology Compass
ABSTRACT This essay explores the complex nature of forgiveness and unforgiveness as responses to wrongdoing. Traditionally, forgiveness has been framed as a process that promotes psychological and relational well‐being, whereas unforgiveness is often viewed as harmful.
Susan D. Boon   +2 more
openaire   +1 more source

Post quantum proxy signature scheme based on the multivariate public key cryptographic signature

open access: yesInternational Journal of Distributed Sensor Networks, 2020
Proxy signature is a very useful technique which allows the original signer to delegate the signing capability to a proxy signer to perform the signing operation.
Jiahui Chen   +6 more
doaj   +1 more source

Certificateless Anonymous Authentication Scheme Supporting Illegal Signatures Localization for Internet of Vehicles [PDF]

open access: yesJisuanji gongcheng
In the Internet of Vehicles (IoV) environment, vehicles are connected to public networks through the Internet and information is vulnerable to various malicious attacks from attackers during transmission.
YANG Xiaodong, LI Muzi, MA Guozu, LI Songyu, WANG Caifen
doaj   +1 more source

Survey of block chain

open access: yes网络与信息安全学报, 2016
With the wide spread of Bitcoin,block chain serving as the building block of digital currency becomes a hot spot in industry and academia.Due to the decentration of network,the unforgeability of block data,etc.,block chain has attracted more and more ...
Xin SHEN, Qing-qi PEI, Xue-feng LIU
doaj   +3 more sources

A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings

open access: yesJournal of Applied Mathematics, 2014
As people in modern societies are busier than any human era and computer network has profound impact on how people work and live through fast and convenient information exchange, people need more help from each other to accomplish more work via network ...
Nai-Wei Lo, Jia-Lun Tsai
doaj   +1 more source

Efficient Authenticated Encryption Schemes with Public Verifiability

open access: yes, 2004
An authenticated encryption scheme allows messages to be encrypted and authenticated simultaneously. In 2003, Ma and Chen proposed such a scheme with public verifiability.
Bao, Feng   +3 more
core   +2 more sources

Improving Security of Existentially Unforgeable Signature Schemes

open access: yesInternational Journal of Electronics and Telecommunications, 2020
In this paper we present a family of transforms that map existentially unforgeable signature schemes to signature schemes being strongly unforgeable. In spite of rising security, the transforms let us make a signature on a union of messages at once. The number of elements in this union depends on the signing algorithm of a scheme being transformed.
openaire   +1 more source

Home - About - Disclaimer - Privacy