Results 31 to 40 of about 2,177 (206)

An identity-based key infrastructure suitable for messaging applications [PDF]

open access: yes, 2007
—Identity-based encryption (IBE) systems are relatively recently proposed; yet they are highly popular for messaging applications since they offer new features such as certificateless infrastructure and anonymous communication. In this paper, we intended
Karatop, Ayse Gul   +3 more
core   +2 more sources

Biometric identity-based cryptography for e-Government environment [PDF]

open access: yes, 2014
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks.
Aljeaid, D, Langensiepen, C, Ma, X
core   +1 more source

A certificateless aggregate signature scheme for security and privacy protection in VANET

open access: yesInternational Journal of Distributed Sensor Networks, 2022
In the vehicular ad hoc network, moving vehicles can keep communicating with each other by entering or leaving the network at any time to establish a new connection.
Eko Fajar Cahyadi   +3 more
doaj   +1 more source

Exploratory study to explore the role of ICT in the process of knowledge management in an Indian business environment [PDF]

open access: yes, 2010
In the 21st century and the emergence of a digital economy, knowledge and the knowledge base economy are rapidly growing. To effectively be able to understand the processes involved in the creating, managing and sharing of knowledge management in the ...
Gururajan, Raj   +3 more
core   +2 more sources

Cryptanalysis and improvement of an efficient certificateless signature scheme

open access: yes, 2008
In traditional digital signature schemes, certificates signed by a trusted party are required to ensure the authenticity of the public key. In Asiacrypt 2003, the concept of certificateless signature scheme was introduced.
Huang, Xinyi, Li, Jiguo, Mu, Yi, Wu, Wei
core   +1 more source

Fully Secure Lightweight Certificateless Signature Scheme for IIoT

open access: yesIEEE Access, 2019
In recent years, Industrial Internet of Things (IIoT) has become increasingly important for applications in the industry. Inevitably, security for IIoT has become a priority in order to deploy secure applications.
Fatemeh Rezaeibagha   +4 more
doaj   +1 more source

Relations among notions of complete non-malleability: indistinguishability characterisation and efficient construction without random oracles [PDF]

open access: yes, 2010
We study relations among various notions of complete non-malleability, where an adversary can tamper with both ciphertexts and public-keys, and ciphertext indistinguishability.
Barbosa, Manuel, Farshim, Pooya
core   +1 more source

Certificateless-based efficient aggregate signature scheme with universal designated verifier

open access: yesTongxin xuebao, 2015
The security model of the certificateless aggregate signature scheme with universal designated verifier was studied,and then a certificateless aggregate signature scheme with universal designated verifier using bilinear pairings was proposed.In the ...
Yu-lei ZHANG   +4 more
doaj   +2 more sources

Cryptanalysis of Two Signature Schemes for IoT-Based Mobile Payments and Healthcare Wireless Medical Sensor Networks

open access: yesIEEE Access, 2020
Certificateless cryptography does not require any certificate for the public key authentication and users' public keys are transmitted with ciphertext/signatures or by making them available in the IoT-based public directory in a proper way.
Kyung-Ah Shim
doaj   +1 more source

Design Principles of Secure Certificateless Signature and Aggregate Signature Schemes for IoT Environments

open access: yesIEEE Access, 2022
Certificateless cryptography resolves the certificate management problem of public-key cryptography and the key-escrow problem of identity-based cryptography.
Kyung-Ah Shim
doaj   +1 more source

Home - About - Disclaimer - Privacy