Articles with "security model" as a keyword



Photo by thinkmagically from unsplash

A Novel Security Model for Cooperative Virtual Networks in the IoT Era

Sign Up to like & get
recommendations!
Published in 2018 at "International Journal of Parallel Programming"

DOI: 10.1007/s10766-018-0580-z

Abstract: The Internet of Things (IoT) has particular applications in public safety as well as other domains such as smart cities, health monitoring, smart homes and environments, smart industry, and various types of pervasive systems. The… read more here.

Keywords: security model; iot era; model cooperative; security ... See more keywords
Photo from wikipedia

Certificateless Signcryption in the Standard Model

Sign Up to like & get
recommendations!
Published in 2017 at "Wireless Personal Communications"

DOI: 10.1007/s11277-016-3554-8

Abstract: Signcryption can realize encryption and signature simultaneously with lower computational costs and communicational overheads than those of the traditional sign-then-encrypt approach. Certificateless cryptosystem solves the key escrow problem in the identity-based cryptosystem and simplifies the… read more here.

Keywords: security model; standard model; model; certificateless signcryption ... See more keywords
Photo from wikipedia

New Blockchain Based Special Keys Security Model With Path Compression Algorithm for Big Data

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3204289

Abstract: In recent years, following the introduction of the IoT (Internet of Things) into our lives and thanks to the rapidly increasing number of digital applications, data is collected from a wide variety of sources at… read more here.

Keywords: blockchain based; big data; security; security model ... See more keywords
Photo from wikipedia

Quantum proxy signature with provable security

Sign Up to like & get
recommendations!
Published in 2020 at "Modern Physics Letters A"

DOI: 10.1142/s0217732320501977

Abstract: A quantum proxy signature scheme makes the proxy signer can generate a quantum signature on behalf of the original signer. Although many quantum proxy signature schemes have been proposed, none of them can be formally… read more here.

Keywords: security model; quantum proxy; quantum; proxy signature ... See more keywords