4.5 Article

Blockchain-enhanced certificateless signature scheme in the standard model

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Artificial Intelligence

Blockchain-based multi-layered federated extreme learning networks in connected vehicles

Durga Rajan et al.

Summary: Intelligent and networked vehicles contribute to the efficiency of vehicular network infrastructure, but also expose these networks to cyber-attacks. Intrusion detection systems (IDS) are used to prevent vehicle network assaults. However, current learning-based IDS face challenges in terms of processing capabilities and defense effectiveness. This study proposes a Blockchain-based Multi-Layer Federated Extreme Learning Machines (MLFEM) enabled IDS (BEF-IDS) for secure data transfers.

EXPERT SYSTEMS (2023)

Article Computer Science, Information Systems

Certificateless signature schemes in Industrial Internet of Things: A comparative survey

Saddam Hussain et al.

Summary: The Internet of Things provides universal connectivity by transforming common objects into connected ones, paving the way for innovative services supporting improved efficiency and flexibility. The Industrial Internet of Things (IIoT) domain is facing increasing security threats, prompting research into efficient security solutions. This study aims to classify and compare different certificateless signature schemes in the IIoT domain to address security flaws and causes.

COMPUTER COMMUNICATIONS (2022)

Article Computer Science, Information Systems

An Authentication-Based Secure Data Aggregation Method in Internet of Things

Maryam Ataei Nezhad et al.

Summary: The Internet of Things (IoT) allows for the connection and remote management of different devices through the internet. In this paper, a three-phase method is proposed to address privacy and information security concerns. The method includes constructing star structures, encrypting data with unique keys, and using an authentication protocol to enhance security.

JOURNAL OF GRID COMPUTING (2022)

Article Environmental Sciences

Reservoir Operation Management with New Multi-Objective (MOEPO) and Metaheuristic (EPO) Algorithms

Icen Yoosefdoost et al.

Summary: This study examined three different policies to improve the performance of reservoirs, finding that the Hedging Rule (HR) significantly outperformed the Standard Operation Policy (SOP) in enhancing reservoir performance indexes, and the Multi-Objective Optimization method (MOO) also yielded significant improvements in reservoir performance indexes.
Article Automation & Control Systems

Blockchain-Based Reliable and Efficient Certificateless Signature for IIoT Devices

Weizheng Wang et al.

Summary: The Industrial Internet of Things (IIoT) has significantly transformed personal lifestyles and society operations, sparking interest in areas such as intelligent logistics, smart grids, and smart cities. To address security concerns in IIoT, researchers have proposed a novel certificateless signature scheme using blockchain technology and smart contracts, demonstrating its advantages in security and efficiency.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Review Engineering, Electrical & Electronic

Next Generation IoT and Blockchain Integration

Sarvesh Tanwar et al.

Summary: The lack of intrinsic security measures in the next generation IoT makes it vulnerable to privacy and security threats. Blockchain, with its security by design, can address these security requirements and make the entire system more decentralized.

JOURNAL OF SENSORS (2022)

Article Computer Science, Information Systems

Distributed-Ledger-Based Blockchain Technology for Reliable Electronic Voting System with Statistical Analysis

Rupa Ch et al.

Summary: This paper presents an electronic voting system utilizing blockchain technology, offering a better solution compared to traditional elections, ensuring accuracy and security in the electoral process.

ELECTRONICS (2022)

Article Computer Science, Information Systems

A Survey of Intelligent Network Slicing Management for Industrial IoT: Integrated Approaches for Smart Transportation, Smart Energy, and Smart Factory

Yulei Wu et al.

Summary: This paper focuses on the application of intelligent network slicing management in the Industrial Internet of Things (IIoT), covering key services such as smart transportation, smart energy, and smart factory. The paper provides a detailed investigation and analysis, highlighting the advantages and drawbacks of existing works and surveys in terms of important criteria. Additionally, an intelligent network slicing management architecture is proposed, along with a detailed analysis of application requirements, network slicing architecture, and enabling technologies for each service. The paper also identifies key challenges and open issues for future research.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2022)

Article Computer Science, Information Systems

A Novel Efficient Certificateless Signature Scheme for the Prevention of Content Poisoning Attack in Named Data Networking-Based Internet of Things

Saddam Hussain et al.

Summary: This article focuses on protecting NDN-based IoT networks from Content Poisoning Attack by proposing a certificateless signature scheme that is formally secure and cost-efficient.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

A New Certificateless Signature Scheme Provably Secure in the Standard Model

Kyung-Ah Shim

IEEE SYSTEMS JOURNAL (2019)

Article Computer Science, Information Systems

Certificate less signature scheme with security enhanced in the standard model

Yumin Yuan et al.

INFORMATION PROCESSING LETTERS (2014)

Article Computer Science, Information Systems

Improved certificateless signature scheme provably secure in the standard model

Y. Yu et al.

IET INFORMATION SECURITY (2012)

Article Computer Science, Theory & Methods

Certificateless signature: a new security model and an improved generic construction

Bessie C. Hu et al.

DESIGNS CODES AND CRYPTOGRAPHY (2007)

Article Computer Science, Hardware & Architecture

The random oracle methodology, revisited

R Canetti et al.

JOURNAL OF THE ACM (2004)