The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To ensure the authenticity, integrity, and confidentiality of bundles, the in-transit Protocol Data Units of bundle protocol (BP) in space delay/disruption tolerant networks (DTNs), the Consultative Committee for Space Data Systems bundle security protocol (BSP) specification suggests four IPsec style security headers to provide four aspects of security services. However, this specification leaves...
VANET is very important for improving traffic safety and efficiency. So the messages in VANET must be trustworthy and disseminated very fast. In this paper, an efficient and secure scheme is proposed for VANET messages authentication, group signature is used for the messages from private vehicles and identity-based signature for public vehicles and RSU, further more, it employs batch message-processing...
Three-party authenticated key exchange protocol (3PAKE) is an important cryptographic technique for secure communication which allows two parties to agree a new secure session key with the help of a trusted server. In this paper, we proposed a new three-party authenticated key exchange protocol which aims to achieve more efficiency with the same security level of other existing 3PAKE protocols. Security...
Traditional digital signatures usually are computationally expensive and offer no anonymity to signers. It is not very applicable to mobile commerce, where lots of resource-constrained portable devices are involved. In this paper, we first propose a novel hash chain, called multipath hash chain. Then, a new signature protocol, that combines multipath hash chain with server-supported signature technique,...
Privacy protection is particularly challenging in location based services (LBS). On one hand, service providers want to authenticate legitimate users. On the other hand, mobile users would prefer not to expose any information which enables anyone, including service providers, to get some clue regarding their whereabouts. To resolve this dilemma, we propose an anonymous authentication protocol to protect...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.