Results 51 to 60 of about 8,381 (240)

LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments

open access: yes, 2008
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile ...
Beheshti, A. A., Toorani, M.
core   +3 more sources

Advanced Emissivity Tuning Via Femtosecond Laser Surface Engineering

open access: yesAdvanced Optical Materials, Volume 14, Issue 1, 9 January 2026.
Femtosecond laser surface processing (FLSP) is employed to fabricate titanium‐based metamaterials with engineered micro/nano‐scale features that exhibit spectrally selective and omnidirectional thermal emissivity. By integrating advanced ellipsometry, electromagnetic modeling, and compositional analysis, the work reveals resonance‐driven emissivity ...
Zahra Kamali Khanghah   +8 more
wiley   +1 more source

Asymmetric cryptosystem based on optical scanning cryptography and elliptic curve algorithm

open access: yesScientific Reports, 2022
We propose an asymmetric cryptosystem based on optical scanning cryptography (OSC) and elliptic curve cryptography (ECC) algorithm. In the encryption stage of OSC, an object is encrypted to cosine and sine holograms by two pupil functions calculated via ...
Xiangyu Chang   +4 more
doaj   +1 more source

Implementasi Algoritma ECDSA untuk Pengamanan E-Mail (Verifikasi Keaslian Pesan) [PDF]

open access: yes, 2010
This final project is discussed about implementation of digital signature on email delivery with java programming language. Digital signature is one of the cryptographic security services that provide assurance to the recipient of the message (receiver).
Prabowo, Pualam Sendi Agung   +2 more
core  

MA‐LCPPA: A Multi‐Aggregator Lattice‐Based Conditional Privacy‐Preserving Authentication Scheme for Scalable and Quantum‐Secure VANETs

open access: yesIET Intelligent Transport Systems, Volume 20, Issue 1, January/December 2026.
This paper addresses the limitations of existing conditional privacy‐preserving authentication (CPPA) schemes in vehicular ad hoc networks (VANETs), which are either computationally heavy or vulnerable to quantum attacks. It proposes a multi‐aggregator lattice‐based CPPA (MA‐LCPPA) framework that distributes verification across multiple roadside units ...
Adi El‐Dalahmeh, Jie Li
wiley   +1 more source

Constructing a Cryptosystem Algorithm by Applying the Rosenberg-Strong Pairing Function on the Elliptic Curve Cryptography [PDF]

open access: yesBIO Web of Conferences
In this paper, we propose a new algorithm to improve the security of the Elliptic Curve Cryptography algorithm, ECC, using the Rosenberg-Strong pairing function.
Namous Sarah.H.   +2 more
doaj   +1 more source

Gradient Boosting‐Based Modeling of Structural Performance in Hybrid Multi‐Tube Columns

open access: yesAdvances in Civil Engineering, Volume 2026, Issue 1, 2026.
This study presents an advanced predictive framework for estimating the ultimate confined strength (fcc,u) and ultimate strain (εcc,u) of a hybrid multi‐tube concrete column (MTCC), an innovative structural system that combines a fiber‐reinforced polymer (FRP) outer tube, inner steel tubes, and void‐filled concrete.
Yinghui Sun   +3 more
wiley   +1 more source

A versatile Montgomery multiplier architecture with characteristic three support [PDF]

open access: yes, 2008
We present a novel unified core design which is extended to realize Montgomery multiplication in the fields GF(2n), GF(3m), and GF(p). Our unified design supports RSA and elliptic curve schemes, as well as the identity-based encryption which requires a ...
Ozturk, Erdinc   +4 more
core   +2 more sources

A Secure and Robust Blockchain‐Based Medical Image Encryption Approach Using Lorenz Chaotic System

open access: yesJournal of Sensors, Volume 2026, Issue 1, 2026.
Keeping medical images confidential while transmitting is crucial, especially in an open networking environment. One effective approach is blockchain‐based encryption, which provides strong security for sensitive healthcare data. To ensure the greatest levels of medical data integrity and authenticity, our proposed scheme employs a unique Lorenz ...
Fahima Hajjej   +4 more
wiley   +1 more source

Nested Method for Optimizing Elliptic Curve Scalar Multiplication [PDF]

open access: yesEngineering and Technology Journal, 2017
The algebraic curve that attracted considerable interest in recent years is called Elliptic Curve (EC). This is due to the computational complexity of its arithmetic over a finite field.
N. Ghanim, M. Magamiss
doaj   +1 more source

Home - About - Disclaimer - Privacy