Lightweight verification and fine-grained access control in named data networking based on schnorr signature and hash functions
Named Data Networking (NDN) is a new kind of architecture for future Internet, which is exactly satisfied with the rapidly increasing mobile requirement and information-depended applications that dominate today's Internet. However, the current verification-data accessed system is not safe enoug...
| Main Authors: | Wu, Shanglun, Yuan, Yujie, Kar, Pushpendu |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2021
|
| Subjects: | |
| Online Access: | https://eprints.nottingham.ac.uk/65184/ |
Similar Items
New proxy signatures with message recovery using pairing
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
A new proxy signature scheme as secure as EIGamal signature
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008)
by: Syamsuddin, I, et al.
Published: (2008)
Improvement of a convertible undeniable partially blind signature scheme
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Committal deniable signatures over elliptic curves
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
A collision resistant cryptographic hash function based on cellular automata rules
by: Jamil, Norziana
Published: (2013)
by: Jamil, Norziana
Published: (2013)
Practical fair anonymous undeniable signatures
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
An attack on undeniable partially blind signatures
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Name-signature lookup system: a security enhancement to named data networking
by: Song, Zhicheng, et al.
Published: (2021)
by: Song, Zhicheng, et al.
Published: (2021)
An efficient algorithm for exact computation of system and survival signatures using binary decision diagrams
by: Reed, Sean
Published: (2017)
by: Reed, Sean
Published: (2017)
A key management scheme for heterogeneous sensor networks using keyed-hash chain
by: Tian, Biming, et al.
Published: (2009)
by: Tian, Biming, et al.
Published: (2009)
Generalized hash-binary-tree based self-healing key distribution with implicit authentication
by: Tian, Biming, et al.
Published: (2011)
by: Tian, Biming, et al.
Published: (2011)
Signatures of selection and introgression in the genus Gallus
by: Lawal, Raman Akinyanju
Published: (2018)
by: Lawal, Raman Akinyanju
Published: (2018)
A pairing-based blind signature scheme with message recovery
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Genome-wide identification of signatures of positive selection in African admixed zebu cattle
by: Bahbahani, Hussain
Published: (2015)
by: Bahbahani, Hussain
Published: (2015)
Finite element implementation of Koiter's initial post-buckling analysis
by: Yan, Jiayi
Published: (2019)
by: Yan, Jiayi
Published: (2019)
Semi-automatic verification of cropland and grassland using very high resolution mono-temporal satellite images
by: Helmholz, Petra, et al.
Published: (2014)
by: Helmholz, Petra, et al.
Published: (2014)
Directional fractal signature analysis of trabecular bone: evaluation of different methods to detect early osteoarthritis in knee radiographs
by: Wolski, Marcin, et al.
Published: (2009)
by: Wolski, Marcin, et al.
Published: (2009)
Identification by PCR signature-tagged mutagenesis of attenuated Salmonella Pullorum mutants and corresponding genes in a chicken embryo model
by: Geng, Shizhong, et al.
Published: (2017)
by: Geng, Shizhong, et al.
Published: (2017)
Fully coupled elasto-plastic computational framework for fluid pressurised crack evolution in porous media
by: Hardcastle, Alex
Published: (2021)
by: Hardcastle, Alex
Published: (2021)
Automated model-based test case generation using UML activity diagram
by: Monim, Md Abdul
Published: (2018)
by: Monim, Md Abdul
Published: (2018)
An efficient identity-based group signature scheme over elliptic curves
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
Enhanced Verification-Based Decoding for Packet-Based LDPC Codes
by: Zhu, B., et al.
Published: (2008)
by: Zhu, B., et al.
Published: (2008)
A pairing-based blind signature scheme with message recovery
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Digital signature-based secure communication in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011)
by: Parvin, Sazia, et al.
Published: (2011)
Creativity in teaching: what can teachers learn from artists?
by: Hall, Christine, et al.
Published: (2016)
by: Hall, Christine, et al.
Published: (2016)
An Efficient Method for Generating Optimal OBDD of Boolean Functions
by: Singh, Ashutosh, et al.
Published: (2008)
by: Singh, Ashutosh, et al.
Published: (2008)
Hardware-based text-to-braille translator
by: Zhang, Xuan, et al.
Published: (2006)
by: Zhang, Xuan, et al.
Published: (2006)
Metabolic signature in stage A/B heart failure: A study in asymptomatic Type 2 Diabetes
by: Brady, Emer M.
Published: (2024)
by: Brady, Emer M.
Published: (2024)
A New "F-Lueg" Cryptosystem and its Security
by: Choo, Mun Yoong
Published: (2002)
by: Choo, Mun Yoong
Published: (2002)
BET surface area of carbonaceous adsorbents—Verification using geometric considerations and GCMC simulations on virtual porous carbon models
by: Gauden, P., et al.
Published: (2010)
by: Gauden, P., et al.
Published: (2010)
Remarks on BioHashing based cancelable biometrics in verification system
by: JIN, A, et al.
Published: (2006)
by: JIN, A, et al.
Published: (2006)
Dynamic signature verification system
by: Lim, Wai Loon
Published: (2011)
by: Lim, Wai Loon
Published: (2011)
Online Signature Verification System
by: Fauziyah, Salehuddin, et al.
Published: (2009)
by: Fauziyah, Salehuddin, et al.
Published: (2009)
Online signature verification discriminators
by: Omar, Nazaruddin, et al.
Published: (2006)
by: Omar, Nazaruddin, et al.
Published: (2006)
Model-checking for resource-bounded ATL with production and
consumption of resources
by: Alechina, Natasha, et al.
Published: (2017)
by: Alechina, Natasha, et al.
Published: (2017)
Metamorphic testing: a review of challenges and
opportunities
by: Chen, Tsong Yueh, et al.
Published: (2018)
by: Chen, Tsong Yueh, et al.
Published: (2018)
Falling for fake news: investigating the consumption of news via social media
by: Flintham, Martin, et al.
Published: (2018)
by: Flintham, Martin, et al.
Published: (2018)
Relationships between δ13C, δ18O and grain yield in bread wheat genotypes under favourable irrigated and rain-fed conditions
by: Foulkes, M.J., et al.
Published: (2016)
by: Foulkes, M.J., et al.
Published: (2016)
An improved system for sentence-level novelty detection in textual streams
by: Fu, Xinyu, et al.
Published: (2016)
by: Fu, Xinyu, et al.
Published: (2016)
Similar Items
-
New proxy signatures with message recovery using pairing
by: Han, Song, et al.
Published: (2006) -
A new proxy signature scheme as secure as EIGamal signature
by: Han, Song, et al.
Published: (2005) -
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008) -
Improvement of a convertible undeniable partially blind signature scheme
by: Han, Song, et al.
Published: (2006) -
Committal deniable signatures over elliptic curves
by: Han, Song, et al.
Published: (2004)