Results 81 to 90 of about 1,501 (161)
Cryptography: Mathematical Advancements on Cyber Security [PDF]
The origin of cryptography, the study of encoding and decoding messages, dates back to ancient times around 1900 BC. The ancient Egyptians enlisted the use of basic encryption techniques to conceal personal information.
Bower, Kristin
core +1 more source
Privacy-Preserving Multi-Receiver Certificateless Broadcast Encryption Scheme with De-Duplication
Nowadays, the widely deployed and high performance Internet of Things (IoT) facilitates the communication between its terminal nodes. To enhance data sharing among terminal devices and ensure the recipients’ privacy protection, a few anonymous ...
Jianhong Zhang, Peirong Ou
doaj +1 more source
Development of a certificate less digital signature scheme & implementation in e-cash system [PDF]
Today’s wireless communication systems having limited computational resources and communication bandwidth find certificate less public-key cryptosystems very attractive and vital to their operations in the sense that they help in reducing a significant ...
Lenka, Mrutyunjaya, Sahoo, Pravat Kumar
core
Secure and privacy-aware proxy mobile IPv6 protocol for vehicle-to-grid networks [PDF]
Vehicle-to-Grid (V2G) networks have emerged as a new communication paradigm between Electric Vehicles (EVs) and the Smart Grid (SG). In order to ensure seamless communications between mobile EVs and the electric vehicle supply equipment, the support of ...
Hashem Eiza, Mahmoud +3 more
core +2 more sources
Mutual Heterogeneous Signcryption Schemes for 5G Network Slicings
With the emergence of mobile communication technologies, we are entering the fifth generation (5G) mobile communication system era. Various application scenarios will arise in the 5G era to meet the different service requirements.
Jingwei Liu +4 more
doaj +1 more source
SciTech News Volume 71, No. 1 (2017) [PDF]
Columns and Reports From the Editor 3 Division News Science-Technology Division 5 Chemistry Division 8 Engineering Division Aerospace Section of the Engineering Division 9 Architecture, Building Engineering, Construction and Design Section of the ...
core +1 more source
Secure Certificateless Public Key Encryption without Redundancy [PDF]
Certificateless public key cryptography was introduced to solve the key escrow problem in identity based cryptography while enjoying the most attractive {\em certificateless} property.
Futai Zhang, Yinxia Sun
core
Certificateless public key cryptography is a commonly adopted implementation system to solve problems of key-escrow and untrusted authority. Certificateless strong designated verifier signatures (CL-SDVSs) are special variations of digital signatures ...
Han-Yu Lin
doaj +1 more source
Strongly secure certificateless one-pass authenticated key agreement scheme
As certificateless public key cryptography (CLPKC) could solve the problem of keyescrow, recently it has been studied more and more. Certificateless authenticated keyagreement (CLAKA), as an important part of the CLPKC, also attracts ...
BAOJUN HUANG, HANG TU
doaj

