Zobrazeno 1 - 10
of 1 060
pro vyhledávání: '"identity-based cryptography"'
Publikováno v:
Cybersecurity, Vol 7, Iss 1, Pp 1-18 (2024)
Abstract SM9 was established in 2016 as a Chinese official identity-based cryptographic (IBC) standard, and became an ISO standard in 2021. It is well-known that IBC is suitable for Internet of Things (IoT) applications, since a centralized processin
Externí odkaz:
https://doaj.org/article/d5f4023440504ddcaaaf6d9c0d61a03b
Publikováno v:
IEEE Access, Vol 12, Pp 120961-120978 (2024)
Role-based Access Control (RBAC) promises an efficient authorization management system in accessing resources including electric vehicle (EV) data stored in the cloud server. In this EV data security implementation, access control has to be strong an
Externí odkaz:
https://doaj.org/article/c4d5957fb5204d429af62e277589b6d1
Publikováno v:
IEEE Access, Vol 12, Pp 98611-98622 (2024)
With the rocketing progress of the fifth generation (5G) mobile communication technology, identity-based authenticated key agreement (ID-AKA) protocol performs an increasingly significant part in secure communication. The majority of current efficien
Externí odkaz:
https://doaj.org/article/9c756194502f45bb9902d0a7e8c1dd3c
Publikováno v:
ETRI Journal, Vol 45, Iss 6, Pp 1090-1102 (2023)
Authenticated multiple key agreement (AMKA) protocols provide participants with multiple session keys after one round of authentication. Many schemes use Diffie-Hellman or authenticated key agreement schemes that rely on hard integer factorizations t
Externí odkaz:
https://doaj.org/article/fbb32715b8dc4a759b195d81eef20a12
Autor:
Miquel A. Cabot-Nadal, Macia Mut-Puigserver, M. Magdalena Payeras-Capella, Rosa Pericas-Gornals
Publikováno v:
IEEE Access, Vol 11, Pp 142495-142514 (2023)
Blockchain technology can be used in several e-commerce applications, like the creation of certified notifications. This kind of service allows a user, who acts as the sender, to prove that he has sent some data to a receiver. With the use of blockch
Externí odkaz:
https://doaj.org/article/558d5603b8f449a885679cbba6276628
Publikováno v:
Sensors, Vol 24, Iss 1, p 61 (2023)
Internet of Things (IoT) applications have been increasingly developed. Authenticated key agreement (AKA) plays an essential role in secure communication in IoT applications. Without the PKI certificate and high time-complexity bilinear pairing opera
Externí odkaz:
https://doaj.org/article/437a972af07b41df99398fc00003261f
Publikováno v:
网络与信息安全学报, Vol 8, Pp 123-133 (2022)
To solve the security problems of traditional cross-domain authentication schemes, such as single point of failure and excessive dependence on third parties, a cross-domain authentication scheme was proposed which combines IBC and consortium blockcha
Externí odkaz:
https://doaj.org/article/5fd71f9a2d99443a88e8c5fe3d62cdba
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 11, Iss 1, Pp 1-14 (2022)
Abstract Traditional remote data possession auditing mechanisms are usually divided into two types: private auditing and public auditing. Informally, private auditing only allows the original data owner to check the integrity of its outsourced data,
Externí odkaz:
https://doaj.org/article/9cbacf09039a463cb2ce3cacb16a2c0f
Autor:
Chuang Li, Chunxiang Xu
Publikováno v:
IEEE Access, Vol 10, Pp 80015-80026 (2022)
Advances in integrated circuit and wireless communication technologies are making wireless body area networks (WBANs) an increasingly important medical paradigm. By collecting, uploading, and processing real-time physical parameters, WBANs assist cli
Externí odkaz:
https://doaj.org/article/8196b74f11304f3b8d4007b05a1f4de7
Publikováno v:
IEEE Access, Vol 10, Pp 40556-40570 (2022)
The remote data possession checking mechanism can effectively verify the integrity of outsourced data, which can usually be divided into public verification and private verification. The verifier of public verification can be any cloud user, while pr
Externí odkaz:
https://doaj.org/article/123df3a105544f57a3f4d420519c4a00