You are currently on the new version of our website. Access the old version .

6 Results Found

  • Article
  • Open Access
3,404 Views
27 Pages

Certificates are integral to the security of today’s Internet. Protocols like BlockVoke allow secure, timely and efficient revocation of certificates that need to be invalidated. ACME, a scheme used by the non-profit Let’s Encrypt Certifi...

  • Article
  • Open Access
3 Citations
3,547 Views
24 Pages

Protocol flaws such as the well-known Heartbleed bug, security and privacy issues or incomplete specifications, in general, pose risks to the direct users of a protocol and further stakeholders. Formal methods, such as Colored Petri Nets (CPNs), faci...

  • Article
  • Open Access
1 Citations
2,516 Views
11 Pages

A Security-Mediated Encryption Scheme Based on ElGamal Variant

  • Boon Chian Tea,
  • Muhammad Rezal Kamel Ariffin,
  • Amir Hamzah Abd. Ghafar and
  • Muhammad Asyraf Asbullah

20 October 2021

Boneh et al. introduced mediated RSA (mRSA) in 2001 in an attempt to achieve faster key revocation for medium-sized organizations via the involvement of a security mediator (SEM) as a semi-trusted third party to provide partial ciphertext decryption...

  • Article
  • Open Access
10 Citations
3,217 Views
17 Pages

Revocable and Traceable Undeniable Attribute-Based Encryption in Cloud-Enabled E-Health Systems

  • Zhongxiang He,
  • Yuling Chen,
  • Yun Luo,
  • Lingyun Zhang and
  • Yingying Tang

31 December 2023

The emerging cloud storage technology has significantly improved efficiency and productivity in the traditional electronic healthcare field. However, it has also brought about many security concerns. Ciphertext policy attribute-based encryption (CP-A...

  • Feature Paper
  • Article
  • Open Access
16 Citations
4,291 Views
21 Pages

11 November 2019

The security in vehicular ad hoc networks (VANETs) has become a large consideration in safeguarding growing applications and intelligent transport systems. A group signature, a popular authentication approach for VANETs, can be implemented to protect...

  • Article
  • Open Access
8 Citations
3,545 Views
24 Pages

A New Design for Alignment-Free Chaffed Cancelable Iris Key Binding Scheme

  • Tong-Yuen Chai,
  • Bok-Min Goi,
  • Yong-Haur Tay and
  • Zhe Jin

1 February 2019

Iris has been found to be unique and consistent over time despite its random nature. Unprotected biometric (iris) template raises concerns in security and privacy, as numerous large-scale iris recognition projects have been deployed worldwide—f...