Results 121 to 130 of about 437 (175)

Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks

open access: yesKey Management Using Certificateless Public Key Cryptography in Ad Hoc Networks
openaire  

Certificateless Public Key Cryptography in the Standard Model

Fundamenta Informaticae, 2018
Identity-based cryptography has been introduced by Shamir at Crypto’84 to avoid the use of expensive certificates in certified public key cryptography. In such system, the identity becomes the public key and each user needs to interact with a designated authority to obtain the related private key.
Canard, Sébastien, Trinh, Viet Cuong
openaire   +1 more source

Design and Implementation of Certificateless Cryptography for IoT Applications

2023 IEEE 66th International Midwest Symposium on Circuits and Systems (MWSCAS), 2023
This work introduces a cryptographic module for IoT devices that addresses the security vulnerabilities that come with their widespread adoption. Four core cryptographic mod- ules are implemented, including data confidentiality, message integrity, authentication, and secure communication channels.
Fares, Neam, Wang, Bo, Bakiras, Spiridon
openaire   +1 more source

Home - About - Disclaimer - Privacy