A review on remote data auditing in single cloud server: Taxonomy and open issues
Cloud computing has emerged as a computational paradigm and an alternative to the
conventional computing with the aim of providing reliable, resilient infrastructure, and with …
conventional computing with the aim of providing reliable, resilient infrastructure, and with …
[图书][B] Dynamic remote data auditing for securing big data storage in cloud computing
M Sookhak - 2015 - search.proquest.com
Nowadays, organizations produce a huge amount of sensitive data, such as personal
information, financial data, and electronic health records. Consequently, the amount of …
information, financial data, and electronic health records. Consequently, the amount of …
Accumulators from bilinear pairings and applications
L Nguyen - Topics in Cryptology–CT-RSA 2005: The …, 2005 - Springer
We propose a dynamic accumulator scheme from bilinear pairings and use it to construct an
identity-based (ID-based) ring signature scheme with constant-size signatures and to …
identity-based (ID-based) ring signature scheme with constant-size signatures and to …
A survey on cluster-based group key agreement protocols for WSNs
E Klaoudatou, E Konstantinou… - … surveys & tutorials, 2010 - ieeexplore.ieee.org
The scope of this survey is to examine and thoroughly evaluate the cluster-based Group Key
Agreement (GKA) protocols for Wireless Sensor Networks (WSNs). Towards this goal, we …
Agreement (GKA) protocols for Wireless Sensor Networks (WSNs). Towards this goal, we …
Efficient pairing computation on supersingular abelian varieties
PSLM Barreto, SD Galbraith, CÓ hÉigeartaigh… - Designs, Codes and …, 2007 - Springer
We present a general technique for the efficient computation of pairings on Jacobians of
supersingular curves. This formulation, which we call the eta pairing, generalizes results of …
supersingular curves. This formulation, which we call the eta pairing, generalizes results of …
A new two-party identity-based authenticated key agreement
N McCullagh, PSLM Barreto - Topics in Cryptology–CT-RSA 2005: The …, 2005 - Springer
We present a new two-party identity-based key agreement that is more efficient than
previously proposed schemes. It is inspired on a new identity-based key pair derivation …
previously proposed schemes. It is inspired on a new identity-based key pair derivation …
Computing the Tate pairing
M Scott - Cryptographers' Track at the RSA Conference, 2005 - Springer
We describe, in detail sufficient for easy implementation, a fast method for calculation of the
Tate pairing, as required for pairing-based cryptographic protocols. We point out various …
Tate pairing, as required for pairing-based cryptographic protocols. We point out various …
ARSA: An attack-resilient security architecture for multihop wireless mesh networks
Multihop wireless mesh networks (WMNs) are finding ever-growing acceptance as a viable
and effective solution to ubiquitous broadband Internet access. This paper addresses the …
and effective solution to ubiquitous broadband Internet access. This paper addresses the …
[PDF][PDF] Attacks against OLSR: Distributed key management for security
C Adjih, D Raffo, P Muhlethaler - 2nd OLSR Interop/Workshop …, 2005 - researchgate.net
In Mobile Ad Hoc Networks (MANETs), mobile nodes use wireless devices to create
spontaneously a larger network, larger than radio range, in which communication with each …
spontaneously a larger network, larger than radio range, in which communication with each …
Lightweight authentication protocol using self-certified public keys for wireless body area networks in health-care applications
E Lara, L Aguilar, JA Garcia - IEEE Access, 2021 - ieeexplore.ieee.org
Health-care centers have been meeting challenges due to the increase in the aging
population and chronic diseases that need continuous medical monitoring. Wireless body …
population and chronic diseases that need continuous medical monitoring. Wireless body …