You are currently on the new version of our website. Access the old version .

38 Results Found

  • Article
  • Open Access
2 Citations
3,236 Views
24 Pages

We propose highly efficient certificate-less (CL) protocols for the infrastructure used by authenticated key exchange (AKE). The construction is based on elliptic curves (EC) without pairing, which means it can be easily supported by most industrial...

  • Article
  • Open Access
3 Citations
3,452 Views
19 Pages

1 September 2023

Cooperative Intelligent Transport Systems (C-ITSs) are an important development for society. C-ITSs enhance road safety, improve traffic efficiency, and promote sustainable transportation through interconnected and intelligent communication between v...

  • Article
  • Open Access
16 Citations
5,081 Views
17 Pages

Provable Data Possession (PDP) protocol makes it possible for cloud users to check whether the cloud servers possess their original data without downloading all the data. However, most of the existing PDP schemes are based on either public key infras...

  • Article
  • Open Access
975 Views
21 Pages

6 October 2024

The specificity and complexity of space networks render the traditional key management mechanism no longer applicable. The certificate-less-based distributed spatial network key management scheme proposed in this paper combines the characteristics of...

  • Article
  • Open Access
15 Citations
4,237 Views
17 Pages

Lattice-Based Revocable Certificateless Signature

  • Ying-Hao Hung,
  • Yuh-Min Tseng and
  • Sen-Shan Huang

20 October 2017

Certificateless signatures (CLS) are noticeable because they may resolve the key escrow problem in ID-based signatures and break away the management problem regarding certificate in conventional signatures. However, the security of the mostly previou...

  • Article
  • Open Access
19 Citations
7,674 Views
29 Pages

Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things

  • José L. Hernández-Ramos,
  • Jorge Bernal Bernabe,
  • M. Victoria Moreno and
  • Antonio F. Skarmeta

1 July 2015

As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M) nature of these emerging scena...

  • Article
  • Open Access
1,154 Views
25 Pages

STALE: A Scalable and Secure Trans-Border Authentication Scheme Leveraging Email and ECDH Key Exchange

  • Jiexin Zheng,
  • Mudi Xu,
  • Jianqing Li,
  • Benfeng Chen,
  • Zhizhong Tan,
  • Anyu Wang,
  • Shuo Zhang,
  • Yan Liu,
  • Kevin Qi Zhang and
  • Wenyong Wang
  • + 1 author

In trans-border data (data transferred or accessed across national jurisdictions) exchange scenarios, identity authentication mechanisms serve as critical components for ensuring data security and privacy protection, with their effectiveness directly...

  • Article
  • Open Access
1,104 Views
25 Pages

26 April 2025

As a data-centric next-generation network architecture, Named Data Networking (NDN) exhibits inherent compatibility with the distributed nature of the Internet of Things (IoT) through its name-based routing mechanism. However, existing signature sche...

  • Article
  • Open Access
18 Citations
2,811 Views
16 Pages

An Efficient and Secure Certificateless Aggregate Signature Scheme for Vehicular Ad hoc Networks

  • Asad Iqbal,
  • Muhammad Zubair,
  • Muhammad Asghar Khan,
  • Insaf Ullah,
  • Ghani Ur-Rehman,
  • Alexey V. Shvetsov and
  • Fazal Noor

10 August 2023

Vehicular ad hoc networks (VANETs) have become an essential part of the intelligent transportation system because they provide secure communication among vehicles, enhance vehicle safety, and improve the driving experience. However, due to the openne...

  • Review
  • Open Access
26 Citations
4,739 Views
28 Pages

A Comprehensive Survey on Certificate-Less Authentication Schemes for Vehicular Ad hoc Networks in Intelligent Transportation Systems

  • Santhosh Kumar Sripathi Venkata Naga,
  • Rajkumar Yesuraj,
  • Selvi Munuswamy and
  • Kannan Arputharaj

1 March 2023

Data transmission in intelligent transportation systems is being challenged by a variety of factors, such as open wireless communication channels, that pose problems related to security, anonymity, and privacy. To achieve secure data transmission, se...

  • Article
  • Open Access
19 Citations
4,086 Views
16 Pages

3 April 2019

The current advances in cloud-based services have significantly enhanced individual satisfaction in numerous modern life areas. Particularly, the recent spectacular innovations in the wireless body area networks (WBAN) domain have made e-Care service...

  • Article
  • Open Access
3,292 Views
17 Pages

ARIBC: Online Reporting Based on Identity-Based Cryptography

  • Athanasios Goudosis and
  • Sokratis Katsikas

21 February 2021

The reporting of incidents of misconduct, violence, sexual assault, harassment, and other types of crime that constitute a major concern in modern society is of significant value when investigating such incidents. Unfortunately, people involved in su...

  • Article
  • Open Access
4 Citations
3,152 Views
18 Pages

Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security

  • Jingwei Lu,
  • Hongbo Li,
  • Jianye Huang,
  • Sha Ma,
  • Man Ho Allen Au and
  • Qiong Huang

21 February 2023

Transforming data into ciphertexts and storing them in the cloud database is a secure way to simplify data management. Public key encryption with keyword search (PEKS) is an important cryptographic primitive as it provides the ability to search for t...

  • Article
  • Open Access
8 Citations
4,149 Views
27 Pages

A Lattice-Based Certificateless Traceable Ring Signature Scheme

  • Junbin Liang,
  • Jianye Huang,
  • Qiong Huang,
  • Liantao Lan and
  • Man Ho Allen Au

2 March 2023

A ring signature (RS) scheme enables a group member to sign messages on behalf of its group without revealing the definite signer identify, but this also leads to the abuse of anonymity by malicious signers, which can be prevented by traceable ring s...

  • Article
  • Open Access
8 Citations
3,265 Views
16 Pages

An Efficient Certificateless Forward-Secure Signature Scheme for Secure Deployments of the Internet of Things

  • Tahir Ali Shah,
  • Insaf Ullah,
  • Muhammad Asghar Khan,
  • Pascal Lorenz and
  • Nisreen Innab

As an extension of the wired network, the use of the wireless communication network has considerably boosted users’ productivity at work and in their daily lives. The most notable aspect of the wireless communication network is that it overcome...

  • Article
  • Open Access
3 Citations
1,529 Views
29 Pages

An Efficient Certificateless Anonymous Signcryption Scheme for WBAN

  • Weifeng Long,
  • Lunzhi Deng,
  • Jiwen Zeng,
  • Yan Gao and
  • Tianxiu Lu

28 July 2024

A Wireless Body Area Network (WBAN), introduced into the healthcare sector to improve patient care and enhance the efficiency of medical services, also brings the risk of the leakage of patients’ privacy. Therefore, maintaining the communicatio...

  • Article
  • Open Access
6 Citations
2,184 Views
29 Pages

10 July 2024

With the rapid development of artificial intelligence and Internet of Things (IoT) technologies, automotive companies are integrating federated learning into connected vehicles to provide users with smarter services. Federated learning enables vehicl...

  • Article
  • Open Access
5 Citations
1,476 Views
18 Pages

Preserving Privacy of Internet of Things Network with Certificateless Ring Signature

  • Yang Zhang,
  • Pengxiao Duan,
  • Chaoyang Li,
  • Hua Zhang and
  • Haseeb Ahmad

21 February 2025

With the rapid development of quantum computers and quantum computing, Internet of Things (IoT) networks equipped with traditional cryptographic algorithms have become very weak against quantum attacks. This paper focuses on the privacy-preserving pr...

  • Article
  • Open Access
26 Citations
3,930 Views
21 Pages

21 April 2021

Vehicular Ad hoc networks (VANETs) as spontaneous wireless communication technology of vehicles has a wide range of applications like road safety, navigation and other electric car technologies, however its practicability is greatly hampered by cyber...

  • Article
  • Open Access
58 Citations
5,949 Views
23 Pages

15 May 2018

Vehicle ad hoc networks (VANETs) is a promising network scenario for greatly improving traffic efficiency and safety, in which smart vehicles can communicate with other vehicles or roadside units. For the availability of VANETs, it is very important...

  • Article
  • Open Access
826 Views
15 Pages

9 July 2025

The Internet of Drones (IoD) overcomes the physical limitations of traditional ground networks with its dynamic topology and 3D spatial flexibility, playing a crucial role in various fields. However, eavesdropping and spoofing attacks in open channel...

  • Article
  • Open Access
9 Citations
3,419 Views
17 Pages

31 July 2019

Nowadays, the widely deployed and high performance Internet of Things (IoT) facilitates the communication between its terminal nodes. To enhance data sharing among terminal devices and ensure the recipients’ privacy protection, a few anonymous...

  • Article
  • Open Access
16 Citations
3,318 Views
16 Pages

Enabling Secure Communication in Wireless Body Area Networks with Heterogeneous Authentication Scheme

  • Insaf Ullah,
  • Muhammad Asghar Khan,
  • Ako Muhammad Abdullah,
  • Fazal Noor,
  • Nisreen Innab and
  • Chien-Ming Chen

18 January 2023

Thanks to the widespread availability of Fifth Generation (5G) wireless connectivity, it is now possible to provide preventative or proactive healthcare services from any location and at any time. As a result of this technological improvement, Wirele...

  • Article
  • Open Access
8 Citations
2,628 Views
19 Pages

A Lightweight Secure Scheme for Underwater Wireless Acoustic Network

  • Jia Shi,
  • Jinqiu Wu,
  • Zhiwei Zhao,
  • Xiaofei Qi,
  • Wenbo Zhang,
  • Gang Qiao and
  • Dahong Zuo

Due to the open underwater channels and untransparent network deployment environments, underwater acoustic networks (UANs) are more vulnerable to hostile environments. Security research is also being conducted in cryptography, including authenticatio...

  • Article
  • Open Access
26 Citations
5,590 Views
20 Pages

Post Quantum Cryptographic Keys Generated with Physical Unclonable Functions

  • Bertrand Cambou,
  • Michael Gowanlock,
  • Bahattin Yildiz,
  • Dina Ghanaimiandoab,
  • Kaitlyn Lee,
  • Stefan Nelson,
  • Christopher Philabaum,
  • Alyssa Stenberg and
  • Jordan Wright

21 March 2021

Lattice and code cryptography can replace existing schemes such as elliptic curve cryptography because of their resistance to quantum computers. In support of public key infrastructures, the distribution, validation and storage of the cryptographic k...

  • Article
  • Open Access
838 Views
36 Pages

10 November 2025

The integration of federated learning into Industrial Internet of Things (IIoT) networks enables collaborative intelligence but also exposes systems to identity spoofing, model poisoning, and malicious update injection. This paper presents Leash-FL,...

  • Article
  • Open Access
11 Citations
3,202 Views
13 Pages

A Multi-Message Multi-Receiver Signcryption Scheme with Edge Computing for Secure and Reliable Wireless Internet of Medical Things Communications

  • Insaf Ullah,
  • Muhammad Asghar Khan,
  • Ali Alkhalifah,
  • Rosdiadee Nordin,
  • Mohammed H. Alsharif,
  • Abdulaziz H. Alghtani and
  • Ayman A. Aly

28 November 2021

Thanks to recent advancements in biomedical sensors, wireless networking technologies, and information networks, traditional healthcare methods are evolving into a new healthcare infrastructure known as the Internet of Medical Things (IoMT). It enabl...

  • Article
  • Open Access
18 Citations
2,626 Views
13 Pages

A Certificateless Authenticated Key Agreement Scheme for the Power IoT

  • Wenchao Cui,
  • Rui Cheng,
  • Kehe Wu,
  • Yuling Su and
  • Yuqing Lei

3 October 2021

Power Internet of Things (IoT) is the application of IoT technology in the field of power grid, which can better control all kinds of power equipment, power personnel and operating environment. However, access to mass terminals brings higher requirem...

  • Article
  • Open Access
3 Citations
1,890 Views
16 Pages

Vehicular ad hoc networks (VANETs), which are the backbone of intelligent transportation systems (ITSs), facilitate critical data exchanges between vehicles. This necessitates secure transmission, which requires guarantees of message availability, in...

  • Article
  • Open Access
14 Citations
3,669 Views
19 Pages

17 July 2020

The Internet of Things (IoT) environment consists of numerous devices. In general, IoT devices communicate with each other to exchange data, or connect to the Internet through a gateway to provide IoT services. Most IoT devices participating in the I...

  • Article
  • Open Access
2 Citations
1,043 Views
21 Pages

Lightweight Group Signature Scheme Based on PUF for UAV Communication Security

  • Askar Sysoyev,
  • Karim Nauruzov,
  • Arijit Karati,
  • Olga Abramkina,
  • Yelizaveta Vitulyova,
  • Damelya Yeskendirova,
  • Yelena Popova and
  • Farida Abdoldina

10 October 2025

This paper presents a certificateless group signature scheme designed specifically for Unmanned Aerial Vehicle (UAV) communications in resource-constrained environments. The scheme leverages Physical Unclonable Functions (PUFs) and elliptic curve cry...

  • Article
  • Open Access
388 Views
22 Pages

As electric vehicles (EVs) gain popularity, the existing public charging infrastructure is struggling to keep pace with the rapidly growing demand for the immediate charging needs of EVs. V2V power trading has gradually attracted widespread attention...

  • Article
  • Open Access
19 Citations
6,256 Views
19 Pages

18 September 2020

In the Internet of Things (IoT) environment, more types of devices than ever before are connected to the internet to provide IoT services. Smart devices are becoming more intelligent and improving performance, but there are devices with little comput...

  • Article
  • Open Access
1 Citations
1,623 Views
26 Pages

A Secure Certificate-Based Data Integrity Auditing Protocol with Cloud Service Providers

  • Yuan Tian,
  • Xuan Zhou,
  • Tanping Zhou,
  • Weidong Zhong,
  • Ruifeng Li and
  • Xiaoyuan Yang

25 June 2024

With the surge in cloud storage popularity, more individuals are choosing to store large amounts of data on remote cloud service providers (CSPs) to save local storage resources. However, users’ primary worries revolve around maintaining data i...

  • Article
  • Open Access
5 Citations
2,739 Views
17 Pages

A Resource-Friendly Certificateless Proxy Signcryption Scheme for Drones in Networks beyond 5G

  • Muhammad Asghar Khan,
  • Hosam Alhakami,
  • Insaf Ullah,
  • Wajdi Alhakami,
  • Syed Agha Hassnain Mohsan,
  • Usman Tariq and
  • Nisreen Innab

16 May 2023

Security and privacy issues were long a subject of concern with drones from the past few years. This is due to the lack of security and privacy considerations in the design of the drone, which includes unsecured wireless channels and insufficient com...

  • Article
  • Open Access
31 Citations
4,999 Views
26 Pages

11 January 2018

Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication...

  • Article
  • Open Access
2 Citations
1,960 Views
28 Pages

6 December 2023

The Internet of Vehicles (IoV) improves traffic efficiency and enhances driving safety through the real-time collection and analysis of traffic-related data. Numerous secure and privacy-preserving communication protocols have been proposed for the Io...

  • Article
  • Open Access
2 Citations
2,944 Views
21 Pages

13 November 2022

With the rapid development of the Internet of Vehicles, the increase in vehicle functional requirements has led to the continuous increase in complex electronic systems, and the in-vehicle network is extremely vulnerable to network attacks. The contr...