NUK - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 621
1.
  • A study on dynamic group si... A study on dynamic group signature scheme with threshold traceability for blockchain
    Song, Hyo-jin; Kim, Teahoon; Hwang, Yong-Woon ... High-Confidence Computing, June 2024, 2024-06-00, 2024-06-01, Letnik: 4, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    Blockchain technology provides transparency and reliability by sharing transactions and maintaining the same information through consensus among all participants. However, single-signature ...
Celotno besedilo
2.
Celotno besedilo
3.
  • A Threshold Anonymous Authe... A Threshold Anonymous Authentication Protocol for VANETs
    Shao, Jun; Lin, Xiaodong; Lu, Rongxing ... IEEE transactions on vehicular technology, 2016-March, 2016-3-00, 20160301, Letnik: 65, Številka: 3
    Journal Article
    Recenzirano

    Vehicular ad hoc networks (VANETs) have recently received significant attention in improving traffic safety and efficiency. However, communication trust and user privacy still present practical ...
Celotno besedilo
4.
Celotno besedilo

PDF
5.
  • Group Signatures with Desig... Group Signatures with Designated Traceability over Openers’ Attributes
    Anada, Hiroaki; Fukumitsu, Masayuki; Hasegawa, Shingo International Journal of Networking and Computing, 2022, 2022-00-00, Letnik: 12, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    We propose a group signature scheme with a function of designated traceability; each opener has attributes, and a signer of a group signature can be traced by only the openers whose attributes ...
Celotno besedilo
6.
  • Blockchain-Based Secure Dat... Blockchain-Based Secure Data Storage Protocol for Sensors in the Industrial Internet of Things
    Lu, Junqing; Shen, Jian; Vijayakumar, P ... IEEE transactions on industrial informatics, 08/2022, Letnik: 18, Številka: 8
    Journal Article

    The Industrial Internet of Things (IIoT) that introduces Internet of Things (IoT) technology into industrial environments is beneficial to construct smart factories. It utilizes various sensors to ...
Celotno besedilo
7.
  • A privacy-preserving and ac... A privacy-preserving and accountable authentication protocol for IoT end-devices with weaker identity
    Wang, Zhiwei Future generation computer systems, 20/May , Letnik: 82
    Journal Article
    Recenzirano

    In large-scale Internet of Things (IoT) systems, huge volumes of data are collected from anywhere at any time, which may invade people’s privacy, especially when the systems are used in medical or ...
Celotno besedilo
8.
  • Efficient code-based fully ... Efficient code-based fully dynamic group signature scheme
    Wang, Luping; Chen, Jie; Dai, Huan ... Theoretical computer science, 04/2024, Letnik: 990
    Journal Article
    Recenzirano

    Code-based group signature is an important research topic in recent years. Since the pioneering work by Alamélou et al.(WCC 2015), several other schemes have been proposed to provide improvements in ...
Celotno besedilo
9.
  • Lattice-based dynamic unive... Lattice-based dynamic universal accumulator: Design and application
    Zhao, Yong; Yang, Shaojun; Huang, Xinyi Computer standards and interfaces, April 2024, 2024-04-00, Letnik: 89
    Journal Article
    Recenzirano

    Dynamic universal accumulator is a crucial cryptography primitive. This type of accumulator can provide a succinct witness for a member (resp. nonmember) in order to make sure whether such member ...
Celotno besedilo
10.
  • Public Integrity Auditing f... Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
    Jiang, Tao; Chen, Xiaofeng; Ma, Jianfeng IEEE transactions on computers, 2016-Aug.-1, 2016-8-1, 20160801, Letnik: 65, Številka: 8
    Journal Article
    Recenzirano

    The advent of the cloud computing makes storage outsourcing become a rising trend, which promotes the secure remote data auditing a hot topic that appeared in the research literature. Recently some ...
Celotno besedilo
1 2 3 4 5
zadetkov: 621

Nalaganje filtrov