Secure and Efficient maTLS With Proxy Signature Scheme
Many companies providing mobile and web-based internet services deploy various middleboxes, including network and security appliances, to enhance network functionality and security. In particular, security appliances such as Web Application Firewalls and Intrusion Detection/Prevention Systems are fr...
Saved in:
| Main Authors: | Taehyun Ahn, Jiwon Kwak, Seungjoo Kim |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2025-01-01
|
| Series: | IEEE Access |
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/11028591/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Design and implementation of proxy-protected proxy signature based on SM2
by: Qing-xiao GUO, et al.
Published: (2017-09-01) -
Various scenarios of measurements using a smartphone with a LiDAR sensor in the context of integration with the TLS point cloud
by: Janicka Joanna, et al.
Published: (2025-06-01) -
Patch-Based Surface Accuracy Control for Digital Elevation Models by Inverted Terrestrial Laser Scanning (TLS) Located on a Long Pole
by: Juan F. Reinoso-Gordo, et al.
Published: (2024-12-01) -
An Algorithm of (n, t)-Threshold Proxy Signature with an Arbitrator
by: E. A. Tolyupa
Published: (2013-08-01) -
Toward an Era of Secure 5G Convergence Applications: Formal Security Verification of 3GPP AKMA with TLS 1.3 PSK Option
by: Yongho Ko, et al.
Published: (2024-11-01)