Zobrazeno 1 - 10
of 49
pro vyhledávání: '"Baoyuan Kang"'
Publikováno v:
Journal of Algorithms & Computational Technology, Vol 12 (2018)
With rapid development of information and communication technologies purchasing digital content through the Internet has been greatly increased. Therefore, secure and fair electronic payment systems are important issue. To reduce system computational
Externí odkaz:
https://doaj.org/article/aefeb73f7d7042238fb66266a6c71564
Autor:
Baoyuan Kang
Publikováno v:
Journal of Applied Mathematics, Vol 2012 (2012)
In a designated verifier proxy signature scheme, there are three participants, namely, the original signer, the proxy signer, and the designated verifier. The original signer delegates his or her signing right to the proxy signer, then the proxy sign
Externí odkaz:
https://doaj.org/article/8d4417a34db84893b04b0e2deb9bd0aa
Autor:
Baoyuan Kang
Publikováno v:
Journal of Applied Mathematics, Vol 2012 (2012)
Aggregate signature scheme proposed by Boneh, Gentry, Lynn, and Shacham allows n signatures on n distinct messages from n distinct users to aggregate a single signature that convince any verifier that n users did indeed sign the n messages, respectiv
Externí odkaz:
https://doaj.org/article/43efaf0258b14037b59e49b01d30bf20
Publikováno v:
In The Journal of China Universities of Posts and Telecommunications October 2015 22(5):45-48
Publikováno v:
Journal of Innovation and Social Science Research. 8:117-124
Recently, medical and healthcare associations have gradually begun to use the Internet of Things and wireless sensor networks to monitor, collect data, and use wireless body area networks (WBANs) to communicate with patients. However, due to the char
Publikováno v:
Mathematical Problems in Engineering, Vol 2020 (2020)
Recently, a number of authentication protocols integrated with the Internet of Things (IoT) and cloud computing have been proposed for secure access control on large-scale IoT networks. In this paper, we carefully analyze Amin et al.’s authenticati
Publikováno v:
Wuhan University Journal of Natural Sciences. 24:223-228
Mobile wallet is a very convenient means of mobile payment to allow the clients to conduct the payment via their mobile devices. To reduce the computation burden of resourcesconstraint mobile devices, a few mobile wallet protocols with outsourced ver
Publikováno v:
Wuhan University Journal of Natural Sciences. 23:362-368
Cloud storage service reduces the burden of data users by storing users’ data files in the cloud. But, the files might be modified in the cloud. So, data users hope to check data files integrity periodically. In a public auditing protocol, there is
Publikováno v:
Journal of Algorithms & Computational Technology, Vol 12 (2018)
With rapid development of information and communication technologies purchasing digital content through the Internet has been greatly increased. Therefore, secure and fair electronic payment systems are important issue. To reduce system computational
Publikováno v:
Wuhan University Journal of Natural Sciences. 22:165-170
Aggregate signature can aggregate n signatures on n messages from n signers into a single signature that convinces any verifier that n signers sign the n messages, respectively. In this paper, by combining certificateless public key cryptography and