X Liu, Y Wang, Y Li, H Cao - Computer Networks, 2023 - Elsevier
In vehicular ad-hoc networks (VANETs), road traffic efficiency and road safety can be improved through message interaction and sharing between vehicle users, which inevitably …
The first edition of this book was published in 2003. Inevitably, certain parts of the book became outdated quickly. At the same time new developments have continued apace …
D He, S Padhye, J Chen - Computers & Mathematics with Applications, 2012 - Elsevier
Since certificateless public key cryptography (CLPKC) has received widespread attention due to its efficiency in avoiding key escrow problems in identity-based public key …
G Yang, CH Tan - Proceedings of the 6th ACM Symposium on …, 2011 - dl.acm.org
In certificateless cryptography, a user secret key is derived from two partial secrets: one is the identity-based secret key (corresponding to the user identity) generated by a Key …
D He, Y Chen, J Chen, R Zhang, W Han - Mathematical and Computer …, 2011 - Elsevier
Certificateless public key cryptography (CLPKC), which can simplify the complex certificate management in the traditional public key cryptography and resolve the key escrow problem …
W Cui, R Cheng, K Wu, Y Su, Y Lei - Energies, 2021 - mdpi.com
Power Internet of Things (IoT) is the application of IoT technology in the field of power grid, which can better control all kinds of power equipment, power personnel and operating …
TT Tsai, SS Huang, YM Tseng… - IEEE Open Journal …, 2022 - ieeexplore.ieee.org
Certificate-based public key cryptography (CB-PKC) removes the problem of certificate management in traditional public key systems and avoids the key escrow problem in identity …
C Swanson, D Jao - Progress in Cryptology-INDOCRYPT 2009: 10th …, 2009 - Springer
We survey the set of all prior two-party certificateless key agreement protocols available in the literature at the time of this work. We find that all of the protocols exhibit vulnerabilities of …