Results 151 to 160 of about 1,535 (180)
Some of the next articles are maybe not open access.
Certificateless Public Key Cryptography in the Standard Model
Fundamenta Informaticae, 2018Identity-based cryptography has been introduced by Shamir at Crypto’84 to avoid the use of expensive certificates in certified public key cryptography. In such system, the identity becomes the public key and each user needs to interact with a designated authority to obtain the related private key.
Canard, Sébastien, Trinh, Viet Cuong
openaire +1 more source
A Method for Fast Revocation of Certificateless Public Key Cryptography
2006 International Conference on Computer Engineering and Systems, 2006"Certificateless Public Key Cryptography" has very appealing features, namely it does not require any public key certification (traditional Public Key Cryptography) nor having key escrow problem (Identity-Based Cryptography). Unfortunately, construction of Certificateless Public Key Encryption (CLPKE) schemes has so far depended on the use of Identity ...
Ibrahim Ibrahim +2 more
openaire +1 more source
2008 The 9th International Conference for Young Computer Scientists, 2008
The session initiation protocol (SIP) is considered as the dominant signaling protocol for calls over the Internet. However, how to authenticate each other and agree on a session key has not been efficiently solved. In 2007, Wang and Zhang proposed a key agreement protocol and a new authentication and key agreement mechanism for SIP.
Ming Luo, Yingyou Wen, Hong Zhao
openaire +1 more source
The session initiation protocol (SIP) is considered as the dominant signaling protocol for calls over the Internet. However, how to authenticate each other and agree on a session key has not been efficiently solved. In 2007, Wang and Zhang proposed a key agreement protocol and a new authentication and key agreement mechanism for SIP.
Ming Luo, Yingyou Wen, Hong Zhao
openaire +1 more source
An efficient certificateless public key cryptography with authorized equality test in IIoT
Journal of Ambient Intelligence and Humanized Computing, 2019Current time organizations have moved from the conventional industries to smart industries by embracing the approach of Industrial Internet of Things (IIoT), which has provided an avenue for the integration of smart devices and communication technologies.
Rashad Elhabob +3 more
openaire +1 more source
Wireless Personal Communications, 2014
With rapid growth of mobile wireless networks, handheld devices are popularly used by people and many mobile applications have been rapidly developed. Mutual authentication and key agreement are very important security mechanisms in wireless network systems for preventing unauthorized network access, server impersonation attack and malicious attacks of
Ming Luo, Hong Zhao
openaire +1 more source
With rapid growth of mobile wireless networks, handheld devices are popularly used by people and many mobile applications have been rapidly developed. Mutual authentication and key agreement are very important security mechanisms in wireless network systems for preventing unauthorized network access, server impersonation attack and malicious attacks of
Ming Luo, Hong Zhao
openaire +1 more source
Proceedings of the 2nd ACM symposium on Information, computer and communications security, 2007
Certificateless Public Key Cryptography (CL-PKC) enjoys a number of features of Identity-Based Cryptography (IBC) while without having the problem of key escrow. However, it does suffer from an attack where the adversary, Carol, replaces Alice's public key by someone's public key so that Bob, who wants to send an encrypted message to Alice, uses Alice ...
Joseph K. Liu, Man Ho Au, Willy Susilo
openaire +1 more source
Certificateless Public Key Cryptography (CL-PKC) enjoys a number of features of Identity-Based Cryptography (IBC) while without having the problem of key escrow. However, it does suffer from an attack where the adversary, Carol, replaces Alice's public key by someone's public key so that Bob, who wants to send an encrypted message to Alice, uses Alice ...
Joseph K. Liu, Man Ho Au, Willy Susilo
openaire +1 more source
Efficient Revocation of Security Capability in Certificateless Public Key Cryptography
2005This paper presents the first mediated certificateless public key encryption and signature schemes. We also extend our schemes into hierarchical schemes. Our schemes does not suffer from the key escrow property that seems to be inherent in the mediated identity-based schemes.
Hak Soo Ju +4 more
openaire +1 more source
2020
With the introduction of smart cities, transportation, industries, and even smart health care, the Internet of Things (IoT) has risen as a domain of great potential, impact and development with Gartner forecasting about 20.4 billion Internet-connected smart devices connected by 2020.
Manisha Malik +2 more
openaire +1 more source
With the introduction of smart cities, transportation, industries, and even smart health care, the Internet of Things (IoT) has risen as a domain of great potential, impact and development with Gartner forecasting about 20.4 billion Internet-connected smart devices connected by 2020.
Manisha Malik +2 more
openaire +1 more source
2007
Securing the communication between participants in Grid computing environments is an important task, because the participants do not know if the exchanged information has been modified, intercepted or coming/going from/to the right target. In this paper, a hybrid approach based on a combination of incomparable public session keys and certificateless ...
Elvis Papalilo, Bernd Freisleben
openaire +1 more source
Securing the communication between participants in Grid computing environments is an important task, because the participants do not know if the exchanged information has been modified, intercepted or coming/going from/to the right target. In this paper, a hybrid approach based on a combination of incomparable public session keys and certificateless ...
Elvis Papalilo, Bernd Freisleben
openaire +1 more source
2011
The paper sums up some improvements in Kerberos intra-domain authentication protocol included in many domestic and foreign literatures. By analyzing the limitations of those improvement schemes, an improvement in Kerberos intra-domain authentication protocol based on certificateless public-key thought is proposed.
Wang Juan, Cao Man-cheng, Fang Yuan-kang
openaire +1 more source
The paper sums up some improvements in Kerberos intra-domain authentication protocol included in many domestic and foreign literatures. By analyzing the limitations of those improvement schemes, an improvement in Kerberos intra-domain authentication protocol based on certificateless public-key thought is proposed.
Wang Juan, Cao Man-cheng, Fang Yuan-kang
openaire +1 more source

