Sign Up to like & get
recommendations!
0
Published in 2020 at "Mobile Networks and Applications"
DOI: 10.1007/s11036-019-01459-5
Abstract: Despite of having many revocable group signatures schemes proposed in recent years, backward security, which prevents a revoked signer from generating group signatures for future time periods, was still missing the concern. In this paper,…
read more here.
Keywords:
group signatures;
signatures scheme;
scheme provide;
group ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "Proceedings of the Royal Society B: Biological Sciences"
DOI: 10.1098/rspb.2022.0548
Abstract: In animal societies, identity signals are common, mediate interactions within groups, and allow individuals to discriminate group-mates from out-group competitors. However, individual recognition becomes increasingly challenging as group size increases and as signals must be…
read more here.
Keywords:
individual group;
spotted hyenas;
contain individual;
group ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2876126
Abstract: Vehicular ad hoc networks (VANETs) have stimulated interests in both academic and industry settings. Once deployed, they would bring a new driving experience to drivers. However, in an open-access environment, privacy is one of the…
read more here.
Keywords:
group signatures;
group;
authentication;
scheme ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2023.3268574
Abstract: Group signatures are active cryptographic topics where group members are granted right to sign messages anonymously on behalf of their group. However, in practical applications, such rights are not permanent in most cases and are…
read more here.
Keywords:
time;
bound keys;
group;
lattice based ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Transactions on Industrial Informatics"
DOI: 10.1109/tii.2018.2791956
Abstract: In the last years, several academic research efforts have focused on security requirements, threat models, and attack taxonomies concerning the application of the Internet of Things (IoT) in critical systems. Since such systems are strongly…
read more here.
Keywords:
group signatures;
internet things;
event notification;