Results 81 to 90 of about 3,702 (204)

Pencegah Pembajakan Perangkat Lunak Dengan Menggunakan Teknik Identity-Based Encryption Dan Obfuscation [PDF]

open access: yes, 2009
Serangan-serangan terhadap proteksi hak cipta tentunya sangat merugikan pihak produsen yang telah susah payah membangun perangkat lunak ciptaannya. Teknik obfuscation dapat digunakan untuk melindungi isi perangkat lunak dari pesaing atau penyerang yang ...
Wardiana, W. (Wawan)
core  

Certificateless signature scheme without random oracles

open access: yesTongxin xuebao, 2015
The security of certificateless signature schemes can be proved under the random oracle model.However,any implementation of the random oracle may result in insecure schemes.Some certificateless signature schemes without random oracles are not secure ...
Yan-qiong LI, Ji-guo LI, Yi-chen ZHANG
doaj   +2 more sources

Research on pairing-free certificateless batch anonymous authentication scheme for VANET

open access: yesTongxin xuebao, 2017
To solve the problem of security and efficiency of anonymous authentication in vehicular ad hoc network,a pairing-free certificateless batch anonymous authentication scheme was proposed.The public and private keys and pseudonyms were jointly generated by
Cheng SONG   +5 more
doaj  

On the Security of Certificateless Signature Schemes

open access: yesInternational Journal of Distributed Sensor Networks, 2013
Wireless Sensor Network (WSN) has proved its presence in various real time applications and hence the security of such embedded devices is a vital issue. Certificateless cryptography is one of the recent paradigms to provide security.
Gaurav Sharma, Suman Bala, Anil K. Verma
doaj   +1 more source

SciTech News Volume 71, No. 1 (2017) [PDF]

open access: yes, 2017
Columns and Reports From the Editor 3 Division News Science-Technology Division 5 Chemistry Division 8 Engineering Division Aerospace Section of the Engineering Division 9 Architecture, Building Engineering, Construction and Design Section of the ...

core   +1 more source

Internet of Things Security and Forensics: Challenges and Opportunities

open access: yes, 2018
The Internet of Things (IoT) envisions pervasive, connected, and smart nodes interacting autonomously while offering all sorts of services. Wide distribution, openness and relatively high processing power of IoT objects made them an ideal target for ...
Conti, Mauro   +3 more
core   +1 more source

Certificateless online/offline signcryption scheme

open access: yesSecurity and Communication Networks, 2014
AbstractSigncryption is a highly efficient approach to achieve simultaneously confidentiality and authentication of message, which is more feasible than the simple combination of encryption and signature. The online/offline cryptography can further enhance the efficiency of signcryption system process without affecting its security.
Jiguo Li, Jingjing Zhao, Yichen Zhang
openaire   +1 more source

多人数署名の証明可能安全性に関する研究 [PDF]

open access: yes, 2014
筑波大学 (University of Tsukuba ...
Yanai Naoto, 矢内 直人
core  

An ideal multi-secret sharing scheme based on minimal privileged coalitions [PDF]

open access: yes, 2012
How to construct an ideal multi-secret sharing scheme for general access structures is difficult. In this paper, we solve an open problem proposed by Spiez et al.recently [Finite Fields and Their Application, 2011(17) 329-342], namely to design an ...
Li, Zhihui, Song, Yun
core   +1 more source

Security analysis and improvement of a certificateless signcryption scheme

open access: yesTongxin xuebao, 2015
To solve the certificate management problem in the traditional public key cryptography and the key escrow problem in the identity-based public key cryptography, Al-Riyami and Paterson proposed the concept of the certificateless public key cryptography ...
Zhen-guo ZHAO
doaj   +2 more sources

Home - About - Disclaimer - Privacy