Efficient certificate-based signcryption secure against public key replacement attacks and insider attacks.

Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcrypt...
640KB Sizes 1 Downloads 3 Views

Recommend Documents


Adversarial Feature Selection Against Evasion Attacks.
Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulatin

An efficient and secure attribute based signcryption scheme with LSSS access structure.
Attribute based encryption (ABE) and attribute based signature (ABS) provide flexible access control with authentication for data sharing between users, but realizing both functions will bring about too much computation burden. In this paper, we comb

A Hybrid Secure Scheme for Wireless Sensor Networks against Timing Attacks Using Continuous-Time Markov Chain and Queueing Model.
Wireless sensor networks (WSNs) have recently gained popularity for a wide spectrum of applications. Monitoring tasks can be performed in various environments. This may be beneficial in many scenarios, but it certainly exhibits new challenges in term

Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks.
Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved

Brazil's government attacks biodiversity
A critical review of new Brazilian policies