Sign Up to like & get
recommendations!
0
Published in 2017 at "Soft Computing"
DOI: 10.1007/s00500-016-2231-x
Abstract: With the popularity of mobile devices, how to enhance the security and privacy in wireless communications has gained comprehensive attention. Many cryptographic schemes have been introduced for practical applications. In the multi-receiver encryption (MRE) scheme,…
read more here.
Keywords:
mobile devices;
scheme;
clamre scheme;
receiver encryption ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2884798
Abstract: Certificateless multi-receiver encryption/signcryption (CLME/CLMS) has become a research hotspot in the field of information security. Almost all of the existing CLME/CLMS schemes are constructed based on the bilinear pairing computation, a time-consuming operation, which makes…
read more here.
Keywords:
certificateless multi;
signcryption;
multi receiver;
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3280056
Abstract: Key encapsulation schemes in public key system (PKS) can be used to protect sensitive or private data. Unlike traditional PKS and identity-based PKS, certificate-based PKS (CB-PKS) not only avoids the establishment of complex public key…
read more here.
Keywords:
certificate;
multi receiver;
anonymous multi;
key encapsulation ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2020.3025288
Abstract: The rapid development of low-power integrated circuits, wireless communication, intelligent sensors, and microelectronics has allowed the realization of wireless body area networks (WBANs), which can monitor patients’ vital body parameters remotely in real time to…
read more here.
Keywords:
multi receiver;
secure;
protocol;
body ... See more keywords