CL-ASS: An efficient and low-cost certificateless aggregate signature scheme for wireless sensor networks (English)
- New search for: Kar, Jayaprakash
- Further information on Kar, Jayaprakash:
- https://orcid.org/0000-0003-4800-4791
- New search for: Liu, Xiaoguang
- New search for: Li, Fagen
- New search for: Kar, Jayaprakash
- New search for: Liu, Xiaoguang
- New search for: Li, Fagen
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:CL-ASS: An efficient and low-cost certificateless aggregate signature scheme for wireless sensor networks
-
Contributors:
-
Publisher:
- New search for: Elsevier Ltd
-
Publication date:2021-06-07
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 61
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
-
PUF enable lightweight key-exchange and mutual authentication protocol for multi-server based D2D communicationMahmood, Khalid / Shamshad, Salman / Rana, Minahil / Shafiq, Akasha / Ahmad, Shafiq / Akram, Muhammad Arslan / Amin, Ruhul et al. | 2021
-
Intragroup and intergroup secret image sharing based on homomorphic Lagrange interpolationYang, Ching-Nung / Wu, Xiaotian / Lin, Hsuan-Yu / Kim, Cheonshik et al. | 2021
-
Lic-Sec: An enhanced AppArmor Docker security profile generatorZhu, Hui / Gehrmann, Christian et al. | 2021
-
Neural networks based domain name generationWang, Zheng / Guo, Yang et al. | 2021
-
A privacy protection scheme for telemedicine diagnosis based on double blockchainWang, Wei / Wang, Lianhai / Zhang, Peijun / Xu, Shujiang / Fu, Kunlun / Song, Lianxin / Hu, Shanshan et al. | 2021
-
Dynamic secure multi-keyword ranked search over encrypted cloud dataHozhabr, Maryam / Asghari, Parvaneh / Javadi, Hamid Haj Seyyed et al. | 2021
-
High throughput novel architectures of TEA family for high speed IoT and RFID applicationsMishra, Zeesha / Acharya, Bibhudendra et al. | 2021
-
Image data security using Quasigroup combined with Fibonacci Q-transformationKumar, Sachin et al. | 2021
-
Toward securing the control plane of 5G mobile networks against DoS threats: Attack scenarios and promising solutionsEttiane, Raja / Chaoub, Abdelaali / Elkouch, Rachid et al. | 2021
-
Analysis and enhancement of secure three-factor user authentication using Chebyshev Chaotic MapMaitra, Tanmoy / Singh, Shiwangi / Saurabh, Ritwik / Giri, Debasis et al. | 2021
-
AI@TSS- Intelligent technical support scam detection systemChen, Yu-Chen / Chen, Jiann-Liang / Ma, Yi-Wei et al. | 2021
-
Blockchain for edge-enabled smart cities applicationsJan, Mian Ahmad / Yeh, Kuo-Hui / Tan, Zhiyuan / Wu, Yulei et al. | 2021
-
Efficient defense strategy against spam and phishing email: An evolutionary game modelWang, Mengli / Song, Lipeng et al. | 2021
-
Secure mobile internet voting system using biometric authentication and wavelet based AESS., Ajish / AnilKumar, K.S. et al. | 2021
-
TRAK-CPABE: A novel Traceable, Revocable and Accountable Ciphertext-Policy Attribute-Based Encryption scheme in cloud computingBouchaala, Mariem / Ghazel, Cherif / Saidane, Leila Azzouz et al. | 2021
-
Function-level obfuscation detection method based on Graph Convolutional NetworksJiang, Shuai / Hong, Yao / Fu, Cai / Qian, Yekui / Han, Lansheng et al. | 2021
-
Crook-sourced intrusion detection as a serviceAraujo, Frederico / Ayoade, Gbadebo / Al-Naami, Khaled / Gao, Yang / Hamlen, Kevin W. / Khan, Latifur et al. | 2021
-
I-CIFA: An improved collusive interest flooding attack in named data networkingWu, Zhijun / Feng, Wenzhi / Lei, Jin / Yue, Meng et al. | 2021
-
A memristive RLC oscillator dynamics applied to image encryptionTsafack, Nestor / Iliyasu, Abdullah M. / De Dieu, Nkapkop Jean / Zeric, Njitacke Tabekoueng / Kengne, Jacques / Abd-El-Atty, Bassem / Belazi, Akram / Abd EL-Latif, Ahmed A. et al. | 2021
-
Preventing malicious communication using virtualizationKiperberg, Michael et al. | 2021
-
A two-phase gradient based feature embedding approachChatterjee, Agneet / Ghosh, Soulib / Chakraborty, Anuran / Ghosal, Sudipta Kr / Sarkar, Ram et al. | 2021
-
Simulating SQL injection vulnerability exploitation using Q-learning reinforcement learning agentsErdődi, László / Sommervoll, Åvald Åslaugson / Zennaro, Fabio Massimo et al. | 2021
-
Attention based multi-agent intrusion detection systems using reinforcement learningSethi, Kamalakanta / Madhav, Y. Venu / Kumar, Rahul / Bera, Padmalochan et al. | 2021
-
4D mixed chaotic system and its application to RGB image encryption using substitution-diffusionul Haq, Tanveer / Shah, Tariq et al. | 2021
-
Editorial Board| 2021
-
CL-ASS: An efficient and low-cost certificateless aggregate signature scheme for wireless sensor networksKar, Jayaprakash / Liu, Xiaoguang / Li, Fagen et al. | 2021
-
Stakeholder perspectives and requirements on cybersecurity in EuropeFischer-Hübner, Simone / Alcaraz, Cristina / Ferreira, Afonso / Fernandez-Gago, Carmen / Lopez, Javier / Markatos, Evangelos / Islami, Lejla / Akil, Mahdi et al. | 2021
-
Dynamic threshold ECDSA signature and application to asset custody in blockchainWang, Huili / Ma, Wenping / Deng, Fuyang / Zheng, Haibin / Wu, Qianhong et al. | 2021
-
Guidelines for GDPR compliance in Big Data systemsRhahla, Mouna / Allegue, Sahar / Abdellatif, Takoua et al. | 2021
-
IESCA: An efficient image encryption scheme using 2-D cellular automataRoy, Satyabrata / Shrivastava, Manu / Rawat, Umashankar / Pandey, Chirag Vinodkumar / Nayak, Sanjeet Kumar et al. | 2021
-
Special issue on risk and security of smart systemsKallel, Slim / Cuppens, Frédéric / Boulahia Cuppens, Noura / Hadj Kacem, Ahmed / Ben Othmane, Lotfi et al. | 2021
-
Multicast DIS attack mitigation in RPL-based IoT-LLNsMedjek, Faiza / Tandjaoui, Djamel / Djedjig, Nabil / Romdhani, Imed et al. | 2021
-
Data cryptography in the Internet of Things using the artificial bee colony algorithm in a smart irrigation systemMousavi, Seyyed Keyvan / Ghaffari, Ali et al. | 2021
-
Privacy preservation in Distributed Deep Learning: A survey on Distributed Deep Learning, privacy preservation techniques used and interesting research directionsAntwi-Boasiako, Emmanuel / Zhou, Shijie / Liao, Yongjian / Liu, Qihe / Wang, Yuyu / Owusu-Agyemang, Kwabena et al. | 2021
-
Bottom-boosting differential evolution based digital image security analysisGhai, D. / Tiwari, S. / Das, N.N. et al. | 2021
-
PSCPAC: Post-quantum secure certificateless public auditing scheme in cloud storageLi, Haifeng / Wang, Yuxin / Fu, Xingbing / Lan, Caihui / Wang, Caifen / Li, Fagen / Guo, He et al. | 2021
-
Fast3DS: A real-time full-convolutional malicious domain name detection systemYang, Luhui / Liu, Guangjie / Wang, Jinwei / Bai, Huiwen / Zhai, Jiangtao / Dai, Yuewei et al. | 2021
-
Machine Learning and Software Defined Network to secure communications in a swarm of dronesGuerber, Christophe / Royer, Mickaël / Larrieu, Nicolas et al. | 2021
-
A novel image encryption scheme based on non-adjacent parallelable permutation and dynamic DNA-level two-way diffusionLi, Hongmin / Li, Tie / Feng, Wei / Zhang, Jing / Zhang, Jun / Gan, Lixia / Li, Chunlai et al. | 2021
-
Towards an ultra lightweight block ciphers for Internet of ThingsSliman, Layth / Omrani, Tasnime / Tari, Zahir / Samhat, Abed Ellatif / Rhouma, Rhouma et al. | 2021
-
Corrigendum to Fast hybrid-MixNet for security and privacy using NTRU algorithm: [Journal of Information Security and Applications, Volume 60, August 2021, Start page–End page/102872]Ahmad, Khaleel / Kamal, Afsar / Ahmad, Khairol Amali Bin / Khari, Manju / Crespo, Rubén González et al. | 2021
-
A novel wide & deep transfer learning stacked GRU framework for network intrusion detectionSingh, Nongmeikapam Brajabidhu / Singh, Moirangthem Marjit / Sarkar, Arindam / Mandal, Jyotsna Kumar et al. | 2021
-
SEPS: Efficient public-key based secure search over outsourced dataNayak, Sanjeet Kumar / Tripathy, Somanath et al. | 2021
-
RON-enhanced blockchain propagation mechanism for edge-enabled smart citiesHuang, Junjie / Tan, Liang / Li, Wenjuan / Yu, Keping et al. | 2021
-
StealthPDF: Data hiding method for PDF file with no visual degradationKuribayashi, Minoru / Wong, KokSheik et al. | 2021
-
Flaw and amendment of a two-party authenticated key agreement protocol for post-quantum environmentsDabra, Vivek / Bala, Anju / Kumari, Saru et al. | 2021
-
Bounded opacity for timed systemsAmmar, Ikhlass / El Touati, Yamen / Yeddes, Moez / Mullins, John et al. | 2021
-
A provably secure content distribution framework for portable DRM systemsMishra, Dheerendra / Rana, Saurabh et al. | 2021
-
Android mobile malware detection using fuzzy AHPMohamad Arif, Juliza / Ab Razak, Mohd Faizal / Tuan Mat, Sharfah Ratibah / Awang, Suryanti / Ismail, Nor Syahidatul Nadiah / Firdaus, Ahmad et al. | 2021
-
Investigating the impact of ransomware splash screensYilmaz, Yagiz / Cetin, Orcun / Arief, Budi / Hernandez-Castro, Julio et al. | 2021
-
An improved convolution Merkle tree-based blockchain electronic medical record secure storage schemeZhu, Hegui / Guo, Yujia / Zhang, Libo et al. | 2021