J Wang, S Li, S Wei - … Technology and Application: Second CCF China …, 2020 - Springer
To tackle the difficulty of immediate identity revocation in the identity-based cryptography (IBC) authentication system, this paper proposes an identity signature scheme by security …
M Ma, S Wang, Y Li - 2022 3rd International Conference on …, 2022 - ieeexplore.ieee.org
In the cross-domain authentication architecture, the current method is based on public key infrastructure (PKI) and blockchain to enhance the security of data. However, most models …
K Johnson, J Viera, J Santos - US Patent 11,005,829, 2021 - Google Patents
Various aspects of the subject technology related to systems and methods for providing secure end-to-end data encryption between devices. In one aspect, a method includes …
NN Wang, WL Huang, D Lui, TL Casella… - US Patent …, 2021 - Google Patents
One exemplary implementation involves performing opera tions at a device with one or more processors, a camera, and a computer-readable storage medium, such as a desktop …
A Hasan - US Patent App. 18/135,150, 2024 - Google Patents
Human system operator identity audit trail systems, methods and products for improving computer technology, including in the field of cloud security in the use of computer networks …
M Nakagawa - US Patent 11,218,309, 2022 - Google Patents
An onboard device transfers an encrypted message encrypted outside a vehicle to one or more vehicle control lers connected to a vehicle network. When the encrypted message is …
M Vollmann, U Schusser - US Patent 11,427,504, 2022 - Google Patents
The invention relates to a method to produce a dental structure with a cavity having a negative form of the structure, which is formed in an investment material, wherein flowable …