The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The increasing market share of electric vehicles (EVs) makes charging facilities indispensable infrastructure for integrating EVs into the future intelligent transportation systems and smart grid. One promising facility called fast charging reservation(FCR) system was recently proposed. It allows people to reserve fast chargers ahead of time. In this system, fast chargers are the most scarce resource...
Side-channel information leaks have been reported in various online applications, especially, in wireless local area networks (WLANs) due to the shared-medium nature of wireless links and the ease of eavesdropping. Even when Wi-Fi traffic is encrypted, its characteristics are identifiable, which can be used to infer sensitive user activities and data. Existing countermeasures do not offer effective...
As a concept of delegating signing rights for digital signatures, proxy signature is a well studied subject in cryptography. Most of proxy signature schemes are only proven to be secure in the random oracle. It is a challenge how to construct an efficient proxy signature in the standard model. To overcome this problem, in this paper, we proposed an efficient and provably secure proxy signature scheme...
At present, to access to email account or bank account, a network user has to remember the registered account number of the user and the corresponding password for every service with which they are registered. However, when multiple systems are involved, the user is then required to authenticate to each system individually and repeatedly. It results in inconvenience to each authentication. Recently,...
Delegation is an important means in modern offices system. In some case, we need to control the verification of a proxy signature, since it is not necessary for anyone to be convinced a justification of signer's dishonorable message such as a bill. In the paper, to realize verification's control and proxy signature's revocation, we put forth a new primitive: controllable proxy signature scheme with...
Content authentication is a critical issue for online multimedia systems. A new content authentication scheme based on optimal binary search tree (OBST) was proposed and evaluated to reduce the authentication cost. A balanced tree based approach, however, can not achieve optimal authentication cost when each element is accessed with different probabilities, so it's not appropriate for a practical...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.