Showing 61 - 80 results of 2,564 for search 'mononym~', query time: 4.40s Refine Results
  1. 61
  2. 62
  3. 63
  4. 64
  5. 65
  6. 66
  7. 67

    Anonymous Authentication Scheme for Intercommunication in the Internet of Things Environments by Youngseok Chung, Seokjin Choi, Dongho Won

    Published 2015-11-01
    “…An authentication scheme with anonymity in mobility networks was proposed recently. …”
    Get full text
    Article
  8. 68
  9. 69
  10. 70
  11. 71
  12. 72

    Nonexposure Accurate Location K-Anonymity Algorithm in LBS by Jinying Jia, Fengli Zhang

    Published 2014-01-01
    “…However, to obtain such an anonymous spatial region (ASR), nearly all existent cloaking algorithms require knowing the accurate locations of all users. …”
    Get full text
    Article
  13. 73
  14. 74

    Anonymous group key distribution scheme for the internet of vehicles by Zhiwang HE, Huaqun WANG

    Published 2023-10-01
    “…Vehicular ad hoc networks (VANET) play a crucial role in intelligent transportation systems by providing driving information and services such as collision prevention and improved traffic efficiency.However, when a trusted third party (TTP) interacts with a vehicle in VANET, it can be vulnerable to security threats like eavesdropping, tampering, and forgery.Many existing schemes rely heavily on TTP for key negotiation to establish session keys and ensure session security.However, this over-reliance on TTP can introduce a single point of failure and redundancy issues when TTP sends the same information to multiple vehicles.Additionally, key negotiation methods used for creating group session keys often result in increased interaction data and interaction times.An anonymous group key distribution scheme for the internet of vehicles was proposed to address these challenges.The Road Side Units (RSUs) were used to facilitate the creation of group session keys among multiple vehicles.Identity-based public key cryptography and an improved multi-receiver encryption scheme were utilized for communication between RSUs and vehicles, enabling two-way authentication and secure distribution of group session keys.During the key distribution process, a single encryption operation was sufficient to allow all group members to obtain a consistent session key.This reduced the reliance on TTP for authentication and group communication.Formal security proofs demonstrate that the proposed scheme satisfies basic security requirements.Furthermore, performance analysis and comparisons indicate that this scheme offers lower computational overhead and communication overhead compared to similar schemes.…”
    Get full text
    Article
  15. 75
  16. 76
  17. 77
  18. 78
  19. 79

    Efficient anonymous reputation-based revocation without TTP by Li XI, ENGDeng-guo F

    Published 2014-07-01
    Subjects: “…anonymous revocation…”
    Get full text
    Article
  20. 80