A review on remote data auditing in single cloud server: Taxonomy and open issues

M Sookhak, H Talebian, E Ahmed, A Gani… - Journal of Network and …, 2014 - Elsevier
Cloud computing has emerged as a computational paradigm and an alternative to the
conventional computing with the aim of providing reliable, resilient infrastructure, and with …

Accumulators from bilinear pairings and applications

L Nguyen - Topics in Cryptology–CT-RSA 2005: The …, 2005 - Springer
We propose a dynamic accumulator scheme from bilinear pairings and use it to construct an
identity-based (ID-based) ring signature scheme with constant-size signatures and to …

WITHDRAWN: Dynamic remote data auditing for securing big data storage in cloud computing

M Sookhak, A Gani, MK Khan, R Buyya - 2017 - Elsevier
WITHDRAWN: Dynamic remote data auditing for securing big data storage in cloud
computing - ScienceDirect Skip to main contentSkip to article Elsevier logo Journals & …

A survey on cluster-based group key agreement protocols for WSNs

E Klaoudatou, E Konstantinou… - … surveys & tutorials, 2010 - ieeexplore.ieee.org
The scope of this survey is to examine and thoroughly evaluate the cluster-based Group Key
Agreement (GKA) protocols for Wireless Sensor Networks (WSNs). Towards this goal, we …

Efficient pairing computation on supersingular abelian varieties

PSLM Barreto, SD Galbraith, CÓ hÉigeartaigh… - Designs, Codes and …, 2007 - Springer
We present a general technique for the efficient computation of pairings on Jacobians of
supersingular curves. This formulation, which we call the eta pairing, generalizes results of …

A new two-party identity-based authenticated key agreement

N McCullagh, PSLM Barreto - Topics in Cryptology–CT-RSA 2005: The …, 2005 - Springer
We present a new two-party identity-based key agreement that is more efficient than
previously proposed schemes. It is inspired on a new identity-based key pair derivation …

Computing the Tate pairing

M Scott - Cryptographers' Track at the RSA Conference, 2005 - Springer
We describe, in detail sufficient for easy implementation, a fast method for calculation of the
Tate pairing, as required for pairing-based cryptographic protocols. We point out various …

ARSA: An attack-resilient security architecture for multihop wireless mesh networks

Y Zhang, Y Fang - IEEE Journal on Selected areas in …, 2006 - ieeexplore.ieee.org
Multihop wireless mesh networks (WMNs) are finding ever-growing acceptance as a viable
and effective solution to ubiquitous broadband Internet access. This paper addresses the …

[PDF][PDF] Attacks against OLSR: Distributed key management for security

C Adjih, D Raffo, P Muhlethaler - 2nd OLSR Interop/Workshop …, 2005 - researchgate.net
In Mobile Ad Hoc Networks (MANETs), mobile nodes use wireless devices to create
spontaneously a larger network, larger than radio range, in which communication with each …

A secure and lightweight NDN-based vehicular network using edge computing and certificateless signcryption

CNA Cobblah, Q **a, J Gao, H **a… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Named data networking (NDN), which is an implementation of information-centric
networking (ICN), has emerged as a promising new direction in networking as a result of the …