Constant-Size Hierarchical Identity-Based Signature/Signcryption without Random Oracles [PDF]
We construct the first constant-size hierarchical identity-based signature (HIBS) without random oracles - the signature size is $O(\lambda_s)$ bits, where $\lambda_s$ is the security parameter, and it is independent of the number of levels in the ...
Tsz Hon Yuen, Victor K. Wei
core
A Comprehensive Survey on Pandemic Patient Monitoring System: Enabling Technologies, Opportunities, and Research Challenges. [PDF]
Krishna C, Kumar D, Kushwaha DS.
europepmc +1 more source
Identity based cryptography from pairings. [PDF]
Yuen Tsz Hon.Thesis (M.Phil.)--Chinese University of Hong Kong, 2006.Includes bibliographical references (leaves 109-122).Abstracts in English and Chinese.Abstract --- p.iAcknowledgement --- p.iiiList of Notations --- p.viiiChapter 1 --- Introduction -
core
High Security by using Triple Wrapping Feature and their Comparison [PDF]
In the age of information, cryptography is a predominant obligation for the security of our documents. Cryptography inclusive of authentication, integrity, confidentiality and non-repudiation has lot to offer.
Naveen Choudhary, Pooja Lal Mundaniya
core +1 more source
A Comprehensive Survey on Security and Privacy for Electronic Health Data. [PDF]
Oh SR, Seo YD, Lee E, Kim YG.
europepmc +1 more source
DLSDHMS: Design of a deep learning-based analysis model for secure and distributed hospital management using context-aware sidechains. [PDF]
Reddy VS, Debasis K.
europepmc +1 more source
The Odyssey of Entropy: Cryptography. [PDF]
Zolfaghari B, Bibak K, Koshiba T.
europepmc +1 more source
Blockchain-envisioned access control for internet of things applications: a comprehensive survey and future directions. [PDF]
Bagga P, Das AK, Chamola V, Guizani M.
europepmc +1 more source
Revisiting the Feasibility of Public Key Cryptography in Light of IIoT Communications. [PDF]
Astorga J +3 more
europepmc +1 more source
Empowering IoV Security: A Novel Secure Cryptographic Algorithm (OpCKEE) for Network Protection in Connected Vehicles. [PDF]
Ebadinezhad S, Nlend Bayemi PF.
europepmc +1 more source

