Zobrazeno 1 - 10
of 77
pro vyhledávání: '"CHEN-MOU CHENG"'
Publikováno v:
IEEE Access, Vol 8, Pp 70746-70761 (2020)
The Byzantine general problem is the core problem that consensus algorithms are trying to solve, which is at the heart of the design of blockchains. As a result, we have seen numerous proposals of consensus algorithms in recent years, trying to impro
Externí odkaz:
https://doaj.org/article/c5403d1e27164f6f81cced57322e1859
Autor:
Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai
Publikováno v:
Cryptography, Vol 6, Iss 2, p 20 (2022)
Vehicular Ad-hoc NETworks (VANETs), a special kind of Mobile Ad-hoc NETworks (MANETs), play an important role in Intelligent Transportation Systems (ITS). Via wireless technology, vehicles exchange information related to road conditions and their sta
Externí odkaz:
https://doaj.org/article/4a0eb7c9a16947669aa095949e998ad4
Autor:
Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai
Publikováno v:
Cryptography, Vol 6, Iss 1, p 3 (2022)
This survey reviews the two most prominent group-oriented anonymous signature schemes and analyzes the existing approaches for their problem: balancing anonymity against traceability. Group signatures and ring signatures are the two leading competiti
Externí odkaz:
https://doaj.org/article/fb8403bed71b4240bca27de58c8f99a5
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :1245-1254
Autor:
Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai
Publikováno v:
Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security.
Publikováno v:
IEEE Access, Vol 8, Pp 70746-70761 (2020)
The Byzantine general problem is the core problem that consensus algorithms are trying to solve, which is at the heart of the design of blockchains. As a result, we have seen numerous proposals of consensus algorithms in recent years, trying to impro
Publikováno v:
SSRN Electronic Journal.
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :1061-1071
Publikováno v:
Journal of Information Science & Engineering; Jul2022, Vol. 38 Issue 4, p1211-1229, 19p
Publikováno v:
Security Infrastructure Technology for Integrated Utilization of Big Data ISBN: 9789811536533
Security Infrastructure Technology for Integrated Utilization of Big Data
Security Infrastructure Technology for Integrated Utilization of Big Data
In this chapter, we describe the analysis of security basis. One is the analysis of elliptic curve discrete logarithm problem (ECDLP). ECDLP is one of the public-key cryptosystems that can achieve a short key size but it is not a post-quantum cryptos
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c196b0eadaa69e577eab69ba8151c43c
https://doi.org/10.1007/978-981-15-3654-0_2
https://doi.org/10.1007/978-981-15-3654-0_2