Articles with "secure anonymous" as a keyword



Photo by papaioannou_kostas from unsplash

An Efficient and Secure Anonymous Authentication Scheme for VANETs Based on the Framework of Group Signatures

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2876126

Abstract: Vehicular ad hoc networks (VANETs) have stimulated interests in both academic and industry settings. Once deployed, they would bring a new driving experience to drivers. However, in an open-access environment, privacy is one of the… read more here.

Keywords: group signatures; group; authentication; scheme ... See more keywords
Photo by sharonmccutcheon from unsplash

Secure and Anonymous Communications Over Delay Tolerant Networks

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.2993062

Abstract: Today’s society has a fundamental need for security and anonymity. Well suited, real-life scenarios such as whistleblower reports, intelligence service operations, and the ability to communicate within oppressive governments, call for such fundamental needs. The… read more here.

Keywords: tolerant networks; communications delay; delay tolerant; secure anonymous ... See more keywords
Photo by hudsoncrafted from unsplash

A New Secure and Anonymous Metering Scheme for Smart Grid Communications

Sign Up to like & get
recommendations!
Published in 2019 at "Energies"

DOI: 10.3390/en12244751

Abstract: The smart meter is one of the most important components of the smart grid, which enables bi-directional communication between electric power providers and in-home appliances. However, the fine-grained metering mechanism that reports real-time electricity usage… read more here.

Keywords: smart meter; metering scheme; secure anonymous; smart grid ... See more keywords