[PDF][PDF] Fusion Fault Diagnosis Approach to Rolling Bearing with Vibrational and Acoustic Emission Signals.

J Chen, Y Feng, C Lu, C Fei - CMES-Computer Modeling in …, 2021 - cdn.techscience.cn
As the key component in aeroengine rotor systems, the health status of rolling bearings
directly influences the reliability and safety of aeroengine rotor systems. In order to monitor …

[PDF][PDF] Improvement of efficient and secure smart card based password authentication scheme.

J Moon, D Lee, J Jung, D Won - Int. J. Netw. Secur., 2017 - ijns.jalaxy.com.tw
Remote user authentication scheme is one of the most convenient authentication schemes
to deal with secret data over public communication channel. In order to satisfy the security …

[PDF][PDF] A Certificateless Strong Designated Verifier Signature Scheme with Non-delegatability.

Y Chen, Y Zhao, H Xiong, F Yue - Int. J. Netw. Secur., 2017 - ijns.jalaxy.com.tw
The designated verifier signature only enables the designated verifier to check the
correctness of the signature, while any third party can not verify whether this signature is …

[PDF][PDF] An Identity Based Proxy Signcryption Scheme without Pairings.

H Guo, L Deng - Int. J. Netw. Secur., 2020 - ijns.jalaxy.com.tw
The identity-based cryptography avoids the storage problem of public key certificate of
public key infrastructure. The signcryption mechanism completes both authentication and …

[PDF][PDF] Certificateless Ring Signcryption Scheme from Pairings.

H Guo, L Deng - Int. J. Netw. Secur., 2020 - ijns.jalaxy.com.tw
Signcryption is a useful primitive which simultaneously provides the functions of encryption
and signature. Certificateless cryptography not only eliminates the key escrow property, but …

[PDF][PDF] An efficient identity-based online/offline signature scheme without key escrow

D Liu, S Zhang, H Zhong, R Shi, Y Wang - Int. J. Netw. Secur, 2017 - ijns.jalaxy.com.tw
Recently, several identity-based signature schemes with Bilinear Pairing and Map-To-Point
(MTP) functions have been introduced. However, identity-based cryptography (IBC) …

A big–data security mechanism based on fully homomorphic encryption using cubic spline curve public key cryptography

AVN Krishna - Journal of information and optimization sciences, 2018 - Taylor & Francis
In this work, a Cubic spline curve based Asymmetric mode encrypting data is used for Fully
Homomorphic encryption on Big–Data. A steady state, one dimensional equation is …

[PDF][PDF] A Publicly Verifiable Authenticated Encryption Scheme Based on Factoring and Discrete Logarithms.

CY Tsai, CY Liu, SC Tsaur, MS Hwang - Int. J. Netw. Secur., 2017 - ijns.jalaxy.com.tw
In this article, we propose a publicly verifiable authenticated encryption scheme based on
factoring and discrete logarithms. We point out that even if either factoring or discrete …

[PDF][PDF] A New Level 3 Trust Hierarchal Certificateless Public Key Cryptography Scheme in the Random Oracle Model.

M Hassouna, BIA Barry, E Bashier - Int. J. Netw. Secur., 2017 - academia.edu
Despite the fact that the traditional public key infrastructure provides Level 3 trusted
authority, but its two major problems of scalability and certificate management raised the …

[PDF][PDF] Metamorphic Framework for Key Management and Authentication in Resource-Constrained Wireless Networks.

RV Sampangi, S Sampalli - Int. J. Netw. Secur., 2017 - ijns.jalaxy.com.tw
The advent of the Internet of Things (IoT) has prioritized development in unique identification
and sensing technologies, which facilitate IoT's automated and intelligent vision. Data …