Digital signatures are emerging as accepted solutions for protecting aircraft assets during their storage and distribution over computer networks in aviation information systems (AIS). However, the design of trustworthy signature protocols that can address the unique challenges of AIS is an open problem. This paper presents candidate signature schemes that are able to address some of the major challenges, such as recovering from unanticipated loss of secrecy of signing keys and accommodating delegation of signing authority at ground entities interacting with aircraft. These schemes are shown to be computationally secure. Specifically, the paper proposes a generic construct for making standard signature schemes to be forward secure, ensuring...
Information is an organization’s most valuable asset. As we have seen in previous security and risk ...
The chapter concerns cryptographic schemes enabling to sign digital data in a pseudonymized way. The...
Abstract. In a proxy signature scheme, a potential signer delegates his capabilities to a proxy sign...
Digital signature is emerging as an accepted solution for protecting aircraft assets during their st...
Automatic dependent surveillance-broadcast is an emerging surveillance technology for the future “e-...
UAVs are gaining traction outside their usual markets of hobbyists, areal recordings, and surveillan...
UAVs are gaining momentum in various areas, whether it is in the commercial or private sector. Novel...
Unconditionally secure signature (USS) schemes provide the ability to electronically sign documents ...
Emerging Unmanned Aerial Vehicles (UAVs) have applications for traffic monitoring, public safety, su...
Contemporary developments in airplane manufacturing and maintenance are motivating the introduction ...
A group of small UAVs can synergize to form a flying ad hoc network (FANET). The small UAVs are, typ...
Abstract. Making airplanes network-enabled can significantly increase the efficiency of aircraft man...
Nowadays, people are looking for the easiest way to do things. The digital world has made that even ...
The general trend towards ubiquitous networking has reached the realm of airplanes. E-enabled airpla...
Internet of Drones (IoD) is a decentralized networking architecture that makes use of the internet f...
Information is an organization’s most valuable asset. As we have seen in previous security and risk ...
The chapter concerns cryptographic schemes enabling to sign digital data in a pseudonymized way. The...
Abstract. In a proxy signature scheme, a potential signer delegates his capabilities to a proxy sign...
Digital signature is emerging as an accepted solution for protecting aircraft assets during their st...
Automatic dependent surveillance-broadcast is an emerging surveillance technology for the future “e-...
UAVs are gaining traction outside their usual markets of hobbyists, areal recordings, and surveillan...
UAVs are gaining momentum in various areas, whether it is in the commercial or private sector. Novel...
Unconditionally secure signature (USS) schemes provide the ability to electronically sign documents ...
Emerging Unmanned Aerial Vehicles (UAVs) have applications for traffic monitoring, public safety, su...
Contemporary developments in airplane manufacturing and maintenance are motivating the introduction ...
A group of small UAVs can synergize to form a flying ad hoc network (FANET). The small UAVs are, typ...
Abstract. Making airplanes network-enabled can significantly increase the efficiency of aircraft man...
Nowadays, people are looking for the easiest way to do things. The digital world has made that even ...
The general trend towards ubiquitous networking has reached the realm of airplanes. E-enabled airpla...
Internet of Drones (IoD) is a decentralized networking architecture that makes use of the internet f...
Information is an organization’s most valuable asset. As we have seen in previous security and risk ...
The chapter concerns cryptographic schemes enabling to sign digital data in a pseudonymized way. The...
Abstract. In a proxy signature scheme, a potential signer delegates his capabilities to a proxy sign...