Securing anonymous authenticated announcement protocol for group signature in internet of vehicle / Nur Afiqah Suzelan Amir
The past decade has witnessed a growing interest in vehicular networking and its vast array of potential applications. Improved wireless internet connectivity from vehicles has prompted road safety technologies to emerge. Announcement protocol in Internet of Vehicles (IoV) is an intelligent applicat...
| Main Author: | Nur Afiqah , Suzelan Amir |
|---|---|
| Format: | Thesis |
| Published: |
2021
|
| Subjects: | |
| Online Access: | http://studentsrepo.um.edu.my/12938/ http://studentsrepo.um.edu.my/12938/2/Nur_Afiqah.pdf http://studentsrepo.um.edu.my/12938/1/Nur_Afiqah.pdf |
Similar Items
Practical fair anonymous undeniable signatures
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
Anonymous mutual authentication protocol for RFID tag without back-end database
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
HOOPOE: High performance and efficient anonymous handover authentication protocol for flying out of zone UAVs
by: Khalid, Haqi, et al.
Published: (2023)
by: Khalid, Haqi, et al.
Published: (2023)
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
by: Goi, , BM, et al.
Published: (2004)
by: Goi, , BM, et al.
Published: (2004)
Internet anonymity practices in computer crime
by: Armstrong, Helen, et al.
Published: (2003)
by: Armstrong, Helen, et al.
Published: (2003)
A secure, anonymous and verifiable E-Voting system
by: Ooi, Elynn
Published: (2020)
by: Ooi, Elynn
Published: (2020)
On the security of digital signature protocol based on iterated function systems.
by: M. G. AL-Saidi, Nadia, et al.
Published: (2011)
by: M. G. AL-Saidi, Nadia, et al.
Published: (2011)
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
by: Mohammed, Lawan Ahmed
Published: (2004)
by: Mohammed, Lawan Ahmed
Published: (2004)
Stegano-image as a digital signature to improve security authentication system in mobile computing
by: Mantoro, Teddy, et al.
Published: (2016)
by: Mantoro, Teddy, et al.
Published: (2016)
Effects of Authentication of Users in Mobile Internet Protocol Version 6
by: Obenofunde, Simon Tabi
Published: (2004)
by: Obenofunde, Simon Tabi
Published: (2004)
A review on genetic transformation protocols of tomato (Solanum lycopersicon) / Nurul Afiqah Md Yusop
by: Md Yusop, Nurul Afiqah
Published: (2019)
by: Md Yusop, Nurul Afiqah
Published: (2019)
An Authentication Method for Secure Internet Transaction Using Smart Card and Secure Coprocessor
by: Ayad, Mustafa Abdsalam
Published: (2002)
by: Ayad, Mustafa Abdsalam
Published: (2002)
Security and performance enhancement of authentication protocols in heterogeneous wireless networks
by: Alezabi, Kamal Ali Ahmed
Published: (2017)
by: Alezabi, Kamal Ali Ahmed
Published: (2017)
Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
by: Goi, , BM, et al.
Published: (2005)
by: Goi, , BM, et al.
Published: (2005)
Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
by: Goi, Bok Min, et al.
Published: (2007)
by: Goi, Bok Min, et al.
Published: (2007)
The worth of anonymous feedback
by: Dreher, Heinz, et al.
Published: (2006)
by: Dreher, Heinz, et al.
Published: (2006)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
A secure and efficient revocation protocol for group signatures in vehicular ad hoc networks / Nur Fadhilah Mohd Shari
by: Nur Fadhilah , Mohd Shari
Published: (2018)
by: Nur Fadhilah , Mohd Shari
Published: (2018)
Anonymous: a social movement
by: Knight, William
Published: (2018)
by: Knight, William
Published: (2018)
Offline Handwritten Signature Watermark for Digital Document Authentication
by: Low, Cheng Yaw
Published: (2008)
by: Low, Cheng Yaw
Published: (2008)
Offline Handwritten Signature Watermark For Digital Document Authentication
by: Yaw, Low Cheng
Published: (2008)
by: Yaw, Low Cheng
Published: (2008)
Wise Outlet / Nur Afiqah Mohamad Sufi
by: Mohamad Sufi, Nur Afiqah
Published: (2020)
by: Mohamad Sufi, Nur Afiqah
Published: (2020)
Secured Communication Mechanism For Message Authentication And Data Confidentiality In Secs/Gem Protocol
by: Jaisan S M, Ashish
Published: (2024)
by: Jaisan S M, Ashish
Published: (2024)
A Novel Protocol For Enhancing The Security Of Electronic Transaction Using Gsm Authentication
by: Abu Bakar, Kamalrulnizam, et al.
Published: (2006)
by: Abu Bakar, Kamalrulnizam, et al.
Published: (2006)
Security mediated certificateless signatures
by: Yap, Nvun-She, et al.
Published: (2007)
by: Yap, Nvun-She, et al.
Published: (2007)
A new proxy signature scheme as secure as EIGamal signature
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
The determinants of gold price in Malaysia / Nurul Afiqah Rosli
by: Rosli, Nurul Afiqah
Published: (2017)
by: Rosli, Nurul Afiqah
Published: (2017)
The impact of mass customization products on consumer needs / Afiqah Abdullah
by: Abdullah, Afiqah
Published: (2014)
by: Abdullah, Afiqah
Published: (2014)
Anonymous feedback in e-learning systems
by: Dreher, Heinz
Published: (2005)
by: Dreher, Heinz
Published: (2005)
A New Proxy Signature Scheme As Secure As ElGamal Signature
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Digital Signature-based authentication framework in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2012)
by: Parvin, Sazia, et al.
Published: (2012)
The application of the digital signature laws in governing internet banking security in Malaysia : with special reference to the EU directive and the UK laws on electronic signature / Hartini Saripan
by: Saripan, Hartini
Published: (2012)
by: Saripan, Hartini
Published: (2012)
A New Router Certification Authority
Protocol For Securing Mobile Internet
Protocol Version 6
by: Abdul Hadi Ali Alsalihy, Wafaa
Published: (2007)
by: Abdul Hadi Ali Alsalihy, Wafaa
Published: (2007)
An acoustics study of the monophthongs of Kedah Malay / Afiqah Jazmin Azli
by: Afiqah Jazmin, Azli
Published: (2017)
by: Afiqah Jazmin, Azli
Published: (2017)
Phytochemicals and bioactivities of Cryptocarya Nigra (Lauraceae) / Ayu Afiqah Nasrullah
by: Ayu Afiqah, Nasrullah
Published: (2014)
by: Ayu Afiqah, Nasrullah
Published: (2014)
Non-resident rental housing application / Nurul Afiqah Ayob
by: Ayob, Nurul Afiqah
Published: (2019)
by: Ayob, Nurul Afiqah
Published: (2019)
An ultrasonic assisted dissolution of feather keratin / Nur Afiqah Azmi
by: Nur Afiqah , Azmi
Published: (2019)
by: Nur Afiqah , Azmi
Published: (2019)
The Wealth Effect of the Securities Commission and the Central Bank Announcement
by: Yu, Kee Su
Published: (1997)
by: Yu, Kee Su
Published: (1997)
Secure E-Voting With Blind Signature
by: Ibrahim, Subariah, et al.
Published: (2003)
by: Ibrahim, Subariah, et al.
Published: (2003)
Similar Items
-
Practical fair anonymous undeniable signatures
by: Han, Song, et al.
Published: (2004) -
Anonymous mutual authentication protocol for RFID tag without back-end database
by: Han, Song, et al.
Published: (2007) -
HOOPOE: High performance and efficient anonymous handover authentication protocol for flying out of zone UAVs
by: Khalid, Haqi, et al.
Published: (2023) -
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
by: Goi, , BM, et al.
Published: (2004) -
Internet anonymity practices in computer crime
by: Armstrong, Helen, et al.
Published: (2003)