![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Post-Quantum Public-Key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications
Public-key encryption with keyword search (PEKS) was first proposed by Boneh et al. (EUROCRYPT 2004), achieving the ability to search for ciphertext files. Nevertheless, it is vulnerable to inside keyword guessin...
-
Chapter and Conference Paper
SBA-GT: A Secure Bandwidth Allocation Scheme with Game Theory for UAV-Assisted VANET Scenarios
Unmanned Aerial Vehicles (UAVs) are widely utilized for wireless communication services, promoting the emergence of promising UAV-assisted vehicle networks. However, due to the ever-increasing traffic data and...
-
Chapter and Conference Paper
VMT: Secure VANETs Message Transmission Scheme with Encryption and Blockchain
Vehicular ad-hoc networks (VANETs) is emerging as the most essential technology for securing traffic safety as well as enhancing traffic conditions. The confidentiality of messages transmitted in VANETs is of ...
-
Chapter and Conference Paper
A Lattice-Based Ring Signature Scheme to Secure Automated Valet Parking
Automated Valet Parking (AVP) systems have great potential to mitigate parking pressure. The core of AVP is parking space reservation which users send relevant information to parking lot providers to complete ...