Searched for: "forward secure sequential aggregate authentication"
About 2 results for "forward secure sequential aggregate authentication"
The need for secure logging is well-understood by the security professionals, together with each researchers and practitioners. The flexibility to the accuracy verifies all (or som...
Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended Wireless Sensor Networks
Unattended Wireless Sensor Networks (UWSNs) operating in hostile environments face great security and performance challenges due to the lack of continuous real-time communication b...