SIGNCRYPTION

作品数:48被引量:111H指数:5
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:邓杰航更多>>
相关机构:广东工业大学更多>>
相关期刊:《Computer Modeling in Engineering & Sciences》《Computers, Materials & Continua》《国际计算机前沿大会会议论文集》《Chinese Journal of Electronics》更多>>
相关基金:国家自然科学基金中国博士后科学基金国家重点基础研究发展计划广东省自然科学基金更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
Identity-based searchable attribute signcryption in lattice for a blockchain-based medical system被引量:1
《Frontiers of Information Technology & Electronic Engineering》2024年第3期461-471,共11页Huifang YU Xiaoping BAI 
Project supported by the Special Project of Kunlun Talent Teaching Master of Qinghai Province,China(No.[2020]18)。
Electronic healthcare systems can offer convenience but face the risk of data forgery and information leakage.To solve these issues,we propose an identity-based searchable attribute signcryption in lattice for a block...
关键词:Blockchain Identity-based searchable attribute signcryption Distributed storage NTRU lattice 
Heterogeneous Fault-Tolerant Aggregate Signcryption with Equality Test for Vehicular Sensor Networks
《Computer Modeling in Engineering & Sciences》2023年第10期555-575,共21页Yang Zhao Jingmin An Hao Li Saru Kumari 
supported in part by the Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province under Grant SKLACSS-202102;in part by the Intelligent Terminal Key Laboratory of Sichuan Province under Grant SCITLAB-1019.
The vehicular sensor network (VSN) is an important part of intelligent transportation, which is used for real-timedetection and operation control of vehicles and real-time transmission of data and information. In the ...
关键词:Aggregate signcryption FAULT-TOLERANT HETEROGENEOUS equality test vehicular sensor network 
NTRU_SSS:Anew Method Signcryption Post Quantum Cryptography Based on Shamir’s Secret Sharing被引量:1
《Computers, Materials & Continua》2023年第7期753-769,共17页Asma Ibrahim Hussein Abeer Tariq MaoLood Ekhlas Khalaf Gbashi 
With the advent of quantum computing,numerous efforts have been made to standardize post-quantum cryptosystems with the intention of(eventually)replacing Elliptic Curve Cryptography(ECC)and Rivets-Shamir-Adelman(RSA)....
关键词:Post-quantum cryptography NTRU Shamir’s secret sharing public key 
Intelligent Optimization-Based Clustering with Encryption Technique for Internet of Drones Environment
《Computers, Materials & Continua》2022年第12期6617-6634,共18页Dalia H.Elkamchouchi Jaber S.Alzahrani Hany Mahgoub Amal S.Mehanna Anwer Mustafa Hilal Abdelwahed Motwakel Abu Sarwar Zamani Ishfaq Yaseen 
The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through Large Groups Project Under Grant Number(46/43);Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2022R238),Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia;The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code:22UQU4340237DSR25.
The recent technological developments have revolutionized the functioning of Wireless Sensor Network(WSN)-based industries with the development of Internet of Things(IoT).Internet of Drones(IoD)is a division under IoT...
关键词:Internet of drones atom search algorithm CLUSTERING ENCRYPTION SIGNCRYPTION 
A Secure and Efficient Signature Scheme for IoT in Healthcare被引量:1
《Computers, Materials & Continua》2022年第12期6151-6168,共18页Latika Kakkar Deepali Gupta Sarvesh Tanwar Sapna Saxena Khalid Alsubhi Divya Anand Irene Delgado Noya Nitin Goyal 
This project was funded by the Deanship of Scientific Research(DSR);King Abdulaziz University,Jeddah,under Grant No.(D14-611-1443);The authors,therefore,gratefully acknowledge DSR technical and financial support。
To provide faster access to the treatment of patients,healthcare system can be integrated with Internet of Things to provide prior and timely health services to the patient.There is a huge limitation in the sensing la...
关键词:CSSS digital signature ECC IOT security SIGNCRYPTION smart healthcare system 
An Effective Signcryption with Optimization Algorithm for IoT-enabled Secure Data Transmission
《Computers, Materials & Continua》2022年第11期4017-4031,共15页A.Chinnappa C.Vijayakumaran 
Internet of Things(IoT)allows several low resources and controlled devices to interconnect,calculate processes and make decisions in the communication network.In the heterogeneous environment for IoT devices,several c...
关键词:Security Internet of Things ENCRYPTION optimal key generation metaheuristics 
A power resource dispatching framework with a privacy protection function in the Power Internet of Things被引量:1
《Frontiers of Information Technology & Electronic Engineering》2022年第9期1354-1368,共15页Shuanggen LIU Shuangzi ZHENG Wenbo ZHANG Runsheng FU 
Project supported by the National Natural Science Foundation of China(No.62102311);the Key Research and Development Program of Shaanxi,China(No.2021NY-211)。
Smart meters in the Power Internet of Things generate a large amount of power data.However,data privacy in the process of calculation,storage,and transmission is an urgent problem to be solved.Therefore,in this paper ...
关键词:Power Internet of Things Cloud-fog cooperation Elliptic curve Random oracle model Certificateless aggregate signcryption 
Multi-Receiver Signcryption Scheme with Multiple Key Generation Centers through Public Channel in Edge Computing被引量:4
《China Communications》2022年第4期177-198,共22页Lipeng Wang Zhi Guan Zhong Chen Mingsheng Hu 
supported by National Key Research and Development Program of China (2020YFB1005404);National Natural Science Foundation of China (62172010);Henan Province Higher Education Key Research Project (22A520048)。
The emerging edge computing technology for the Internet of Things has been playing an important role in our daily life. It is promising to utilize a multi-receiver signcryption scheme to protect the transmission data ...
关键词:internet of things SIGNCRYPTION edge computing UNFORGEABILITY CONFIDENTIALITY 
Novel Image Encryption and Compression Scheme for IoT Environment
《Computers, Materials & Continua》2022年第4期1443-1457,共15页Mesfer Al Duhayyim Fahd N.Al-Wesabi Radwa Marzouk Manar Ahmed Hamza Anwer Mustafa Hilal Majdy M.Eltahir 
Latest advancements made in the processing abilities of smartdevices have resulted in the designing of Intelligent Internet of Things (IoT)environment. This advanced environment enables the nodes to connect, collect, ...
关键词:Data compression image security ENCRYPTION SIGNCRYPTION optimal key generation 
An Efficient Proxy Blind Signcryption Scheme for IoT
《Computers, Materials & Continua》2022年第3期4293-4306,共14页Aamer Khan Insaf Ullah Fahad Algarni Muhammad Naeem M.Irfan Uddin Muhammad Asghar Khan 
Recent years have witnessed growing scientific research interest in the Internet of Things(IoT)technologies,which supports the development of a variety of applications such as health care,Industry 4.0,agriculture,ecol...
关键词:Proxy signcryption multi-digital-documents proxy blind signcryption hyperelliptic curve IOT 
检索报告 对象比较 聚类工具 使用帮助 返回顶部