Results 171 to 180 of about 1,777 (202)
Some of the next articles are maybe not open access.
CertificateLess Cryptography-Based Rule Management Protocol for Advanced Mission Delivery Networks
2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW), 2017Assured Mission Delivery Network (AMDN) is a collaborative network to support data-intensive scientific collaborations in a multi-cloud environment. Each scientific collaboration group, called a mission, specifies a set of rules to handle computing and network resources.
Jongho Won, Ankush Singla, Elisa Bertino
openaire +1 more source
An efficient certificateless public key cryptography with authorized equality test in IIoT
Journal of Ambient Intelligence and Humanized Computing, 2019Current time organizations have moved from the conventional industries to smart industries by embracing the approach of Industrial Internet of Things (IIoT), which has provided an avenue for the integration of smart devices and communication technologies.
Rashad Elhabob +3 more
openaire +1 more source
Efficient Revocation of Security Capability in Certificateless Public Key Cryptography
2005This paper presents the first mediated certificateless public key encryption and signature schemes. We also extend our schemes into hierarchical schemes. Our schemes does not suffer from the key escrow property that seems to be inherent in the mediated identity-based schemes.
Hak Soo Ju +4 more
openaire +1 more source
TIBC: Trade-off between Identity-Based and Certificateless Cryptography for future internet
2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications, 2009Identity-Based Cryptography (IBC) offers the very interesting property that the user's public key is related directly to her/his identity. However, IBC suffers from key escrow because the user private key is generated by an external entity called the Private Key Generator (PKG).
Ahmad Ahmad +3 more
openaire +1 more source
2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE), 2013
Virtual Private Networks have been efficient tools that provide inter-connectivity to exchange information between different (remote) parties that belong to a specific network. A virtual private network possesses all the features of the private networks and are built upon existing network, but they suffer severe security problems, particularly, the ...
Abeer Eldewahi, Eihab Basheir
openaire +1 more source
Virtual Private Networks have been efficient tools that provide inter-connectivity to exchange information between different (remote) parties that belong to a specific network. A virtual private network possesses all the features of the private networks and are built upon existing network, but they suffer severe security problems, particularly, the ...
Abeer Eldewahi, Eihab Basheir
openaire +1 more source
Research on Certificateless Public Key Cryptography
Journal of Software, 2011Fu-Tai ZHANG +4 more
openaire +1 more source
Advanced cryptography technique in certificateless environment using SDBAES
International Journal of Advanced Intelligence Paradigms, 2018C.G. Naveen Kumar, C. Chandrasekar
openaire +1 more source
A Study on Fuzzy Keywords Search Techniques and Incorporating Certificateless Cryptography
2022 International Conference on Computing, Communication, Security and Intelligent Systems (IC3SIS), 2022Samiksha Kamble +2 more
openaire +1 more source

