过去一年中添加的文章,按日期排序

An Intelligent Cryptographic Approach for Preserving the Privacy and Security of Smart Home IoT Applications

TN Chitti, M Kalianandi - International Journal of Sensors …, 2024 - ingentaconnect.com
2 天前 - privacy, data dependability, and security in the IoT's edge network are real. The
absence of a system to execute authentication… cannot compromise our privacy through message …

An efficient anonymous authentication scheme for blockchain assisted and fog-enabled smart grid

J Subramani, A Maria, A Sivaraman… - Computers and …, 2024 - Elsevier
5 天前 - … In addition to bolstering security, our proposed authentication scheme champions
user privacy by facilitating anonymous communication between system entities. By …

Based Privacy-Preserving Authentication Scheme Using Chinese Remainder Theorem (CRT) for VANET

HJ Nath - Proceedings of the NIELIT's International Conference … - books.google.com
7 天前 - … Therefore, an authentication scheme that includes the benefits of Software Defined
… In this manuscript, an SDN-enabled privacypreserving authentication scheme using the …

[HTML][HTML] A Secure Authentication Scheme with Local Differential Privacy in Edge Intelligence-Enabled VANET

D Kwon, S Son, K Park, Y Park - Mathematics, 2024 - mdpi.com
8 天前 - authentication scheme to preserve the privacy of user data in edge intelligence-enabled
VANETs. The proposed schemeprivacy of the data using local differential privacy and …

Anonymous and Efficient Authentication Scheme for Privacy-Preserving Federated Cross Learning

Z Li, X Liang - International Conference on Intelligent Computing, 2024 - Springer
9 天前 - privacy-preserving anonymous authentication scheme based on elliptic curve
cryptography for ring signature. Our scheme … thereby achieving privacy preservation [17]. Utilizing …

[PDF][PDF] A Secure and Privacy-Preserving Authentication Scheme with a Zero-Trust Approach to Vehicle Renting in VANETs

M Akil, L Martussi, JH Hoepman - 2024 - repository.ubn.ru.nl
13 天前 - … , which aims to protect privacy of the driver and ensure privacypreserving
accountability. With this inspection protocol, our system achieves privacy-preserving accountability, …

A privacy-preserving three-factor authentication system for IoT-enabled wireless sensor networks

G Thakur, S Prajapat, P Kumar, CM Chen - Journal of Systems Architecture, 2024 - Elsevier
13 天前 - … Intending to elevate both security and efficiency, we propose a novel three-factor
authentication scheme that capitalizes on the strengths of a fuzzy extractor and a …

Secure and Lightweight Conditional Privacy-Preserving Identity Authentication Scheme for VANET

D Zhu, Y Guan - IEEE Sensors Journal, 2024 - ieeexplore.ieee.org
13 天前 - privacy-preserving authentication scheme based on the elliptic curve cryptography
and general one-way hash functions. The schemeauthentication. However, IBC-based …

An Efficient RLWE-based Privacy-Preserving Authentication Scheme based on Edge Computing in Industrial Internet of Things

Y Huang, G Xu, X Song, Y Xu - IEEE Transactions on Services …, 2024 - ieeexplore.ieee.org
13 天前 - privacy-preserving authentication protocol. By integrating edge servers to facilitate
the authentication … Moreover, the proposed scheme achieves mutual authentication in a …

PAKA: Pseudonymous Authenticated Key Agreement without bilinear cryptography

R Schermann, S Bussa, R Urian, R Toegl… - Proceedings of the 19th …, 2024 - dl.acm.org
14 天前 - … However, privacy should also include anonymity or pseudonymity of the device
identity. … a privacy-preserving key agreement method called the Pseudoonymous Authenticated