Results 241 to 250 of about 29,404 (289)
Some of the next articles are maybe not open access.

Convertible authenticated encryption scheme

Journal of Systems and Software, 2002
The digital signature provides the functions of integration, authentication, and non-repudiation for the signing message. In some applications, however, the signature only needs to be verified by some specified recipients while keeping the message secret from the public. The authenticated encryption schemes can be used to achieve this purpose.
Tzong-Sun Wu, Chien-Lung Hsu
openaire   +1 more source

Authenticated Broadcast Encryption Scheme

21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), 2007
With the advancement of wireless networks and mobile access devices such as cell phones and PDAs, multimedia services could be offered through wireless broadcast networks to these mobile devices. Therefore, there is a need to securely deliver multimedia content/data to many users over an insecure channel.
Chik How Tan   +2 more
openaire   +1 more source

Ring authenticated encryption : a new type of authenticated encryption

2004
By combining the two notations of ring signature and authenticated encryption together, we introduce a new type of authenticated encryption signature, called ring authenticated encryption, which has the following properties: signer-ambiguity, signer-verifiability, recipient-designation, semantic-security, verification-convertibility, verification ...
Lv, Jiqiang   +3 more
openaire   +1 more source

Authentication protocols using encryption techniques

2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), 2016
Authentication means to verify the identity. It is the basis for any communication to take place as we do not want to reveal any information which must not be disclosed. In general, authentication requires the presentation of credentials to prove who the user really is.
Venkata SreeKrishna Koganti   +3 more
openaire   +1 more source

Authentication by Encrypted Negative Password

IEEE Transactions on Information Forensics and Security, 2019
Secure password storage is a vital aspect in systems based on password authentication, which is still the most widely used authentication technique, despite some security flaws. In this paper, we propose a password authentication framework that is designed for secure password storage and could be easily integrated into existing authentication systems ...
Wenjian Luo   +3 more
openaire   +1 more source

Authenticated encryption for FPGA bitstreams

Proceedings of the 19th ACM/SIGDA international symposium on Field programmable gate arrays, 2011
FPGA bitstream encryption blocks theft of the design in the FPGA bitstream by preventing unauthorized copy and reverse engineering. By itself, encryption does not protect against tampering with the bitstream, so without additional capabilities, bitstream encryption cannot prevent the FPGA from executing an unauthorized bitstream.
Stephen Trimberger   +2 more
openaire   +1 more source

Heterogeneous Deniable Authenticated Encryption Protocol

2020
Deniable authenticated encryption can achieve confidentiality and deniable authentication in a logical single step. Such a cryptographic primitive simplifies the design of cryptographic scheme and reduces the cost of computation and communication. In this paper, we propose a heterogeneous deniable authenticated encryption scheme called HDAE.
Chunhua Jin   +4 more
openaire   +1 more source

Field Encryption and Authentication

1984
Database encryption and authentication at the field level is attractive because it allows projections to be performed and individual data elements decrypted or authenticated. But field based protection is not usually recommended for security reasons: using encryption to hide individual data elements is vulnerable to ciphertext searching; using ...
openaire   +1 more source

Committing Authenticated Encryption

2023
Krämer, Juliane   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy