A review on remote data auditing in single cloud server: Taxonomy and open issues

M Sookhak, H Talebian, E Ahmed, A Gani… - Journal of Network and …, 2014 - Elsevier
Cloud computing has emerged as a computational paradigm and an alternative to the
conventional computing with the aim of providing reliable, resilient infrastructure, and with …

[图书][B] Dynamic remote data auditing for securing big data storage in cloud computing

M Sookhak - 2015 - search.proquest.com
Nowadays, organizations produce a huge amount of sensitive data, such as personal
information, financial data, and electronic health records. Consequently, the amount of …

Accumulators from bilinear pairings and applications

L Nguyen - Topics in Cryptology–CT-RSA 2005: The …, 2005 - Springer
We propose a dynamic accumulator scheme from bilinear pairings and use it to construct an
identity-based (ID-based) ring signature scheme with constant-size signatures and to …

A survey on cluster-based group key agreement protocols for WSNs

E Klaoudatou, E Konstantinou… - … surveys & tutorials, 2010 - ieeexplore.ieee.org
The scope of this survey is to examine and thoroughly evaluate the cluster-based Group Key
Agreement (GKA) protocols for Wireless Sensor Networks (WSNs). Towards this goal, we …

Efficient pairing computation on supersingular abelian varieties

PSLM Barreto, SD Galbraith, CÓ hÉigeartaigh… - Designs, Codes and …, 2007 - Springer
We present a general technique for the efficient computation of pairings on Jacobians of
supersingular curves. This formulation, which we call the eta pairing, generalizes results of …

A new two-party identity-based authenticated key agreement

N McCullagh, PSLM Barreto - Topics in Cryptology–CT-RSA 2005: The …, 2005 - Springer
We present a new two-party identity-based key agreement that is more efficient than
previously proposed schemes. It is inspired on a new identity-based key pair derivation …

Computing the Tate pairing

M Scott - Cryptographers' Track at the RSA Conference, 2005 - Springer
We describe, in detail sufficient for easy implementation, a fast method for calculation of the
Tate pairing, as required for pairing-based cryptographic protocols. We point out various …

ARSA: An attack-resilient security architecture for multihop wireless mesh networks

Y Zhang, Y Fang - IEEE Journal on Selected areas in …, 2006 - ieeexplore.ieee.org
Multihop wireless mesh networks (WMNs) are finding ever-growing acceptance as a viable
and effective solution to ubiquitous broadband Internet access. This paper addresses the …

[PDF][PDF] Attacks against OLSR: Distributed key management for security

C Adjih, D Raffo, P Muhlethaler - 2nd OLSR Interop/Workshop …, 2005 - researchgate.net
In Mobile Ad Hoc Networks (MANETs), mobile nodes use wireless devices to create
spontaneously a larger network, larger than radio range, in which communication with each …

Lightweight authentication protocol using self-certified public keys for wireless body area networks in health-care applications

E Lara, L Aguilar, JA Garcia - IEEE Access, 2021 - ieeexplore.ieee.org
Health-care centers have been meeting challenges due to the increase in the aging
population and chronic diseases that need continuous medical monitoring. Wireless body …