Zobrazeno 1 - 10
of 40
pro vyhledávání: '"Yangguang Tian"'
Publikováno v:
Sensors, Vol 23, Iss 14, p 6559 (2023)
Recently, Roy et al. proposed a physically unclonable function (PUF)-based authentication and key exchange protocol for Internet of Things (IoT) devices. The PUF protocol is efficient, because it integrates both the Node-to-Node (N2N) authentication
Externí odkaz:
https://doaj.org/article/69c6130c40754d669bd29806a3b2f5d4
Publikováno v:
Crystals, Vol 13, Iss 1, p 30 (2022)
The classical two-step sol-gel hydrothermal method enables the growth of nanoarrays on various substrates via a seed layer. The morphology of the nanoarrays is often tuned by changing the composition ratio of the seed solution. It is taken for grante
Externí odkaz:
https://doaj.org/article/128789a7ffeb4a1a908ac296f2c5cf6b
Autor:
Da-Zhi Sun, Yangguang Tian
Publikováno v:
Mathematics, Vol 10, Iss 22, p 4310 (2022)
Recently, Zerrouki et al. proposed a Physically Unclonable Function (PUF) mutual authentication and session key establishment protocol for IoT (Internet of Things) devices. Zerrouki et al.’s PUF protocol is interesting because it does not require t
Externí odkaz:
https://doaj.org/article/4e00f38b46bd490ea3ae10abbb2448d4
Autor:
Dazhi Sun, Yangguang Tian
Publikováno v:
Mathematics, Vol 10, Iss 22, p 4346 (2022)
Bluetooth low energy (LE) devices have been widely used in the Internet of Things (IoT) and wireless personal area networks (WPAN). However, attackers may compromise user privacy by tracking the addresses of the LE device. The resolvable private addr
Externí odkaz:
https://doaj.org/article/5050955c433746fe85f44bd3d9df6e78
Autor:
Da-Zhi Sun, Yangguang Tian
Publikováno v:
Mathematics, Vol 10, Iss 19, p 3685 (2022)
With the rapid development of cloud computing and mobile networks, more and more application scenarios require a secret group key for secure communication. Group Key Exchange (GKE) protocol provides a secret group key for three or more members. Burme
Externí odkaz:
https://doaj.org/article/4a29d761eea643c6bbec8f17e881de98
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 15 (2019)
In this article, we introduce a new concept of oblivious transfer with membership verification that allows any legitimate group users to obtain services from a service provider in an oblivious manner. We present two oblivious transfer with membership
Externí odkaz:
https://doaj.org/article/9166a099ab0b418292aa68233170de95
Publikováno v:
IEEE Transactions on Vehicular Technology. 71:12304-12314
Publikováno v:
Journal of Information Processing. 30:878-887
M. de Goyon, A. Miyaji and Y. Tian, "Efficient Multi-Party Contact Tracing," in 2021 Ninth International Symposium on Computing and Networking (CANDAR), Matsue, Japan, 2021 pp. 10-18. doi: 10.1109/CANDAR53791.2021.00010.
Since the beginning of t
Since the beginning of t
Publikováno v:
The Computer Journal.
Policy-based chameleon hash is a useful primitive for blockchain rewriting systems. It allows a user to create a mutable transaction associated with an access policy, whereas a modifier who possesses sufficient rewriting privileges from a trusted aut
Publikováno v:
Journal of Computer Security. 29:273-298
In this paper, we introduce a new construction of reusable fuzzy signature based remote user authentication that is secure against quantum computers. We investigate the reusability of fuzzy signature, and we prove that the fuzzy signature schemes pro