Results 91 to 100 of about 423 (151)

Constant-Size Hierarchical Identity-Based Signature/Signcryption without Random Oracles [PDF]

open access: yes, 2006
We construct the first constant-size hierarchical identity-based signature (HIBS) without random oracles - the signature size is $O(\lambda_s)$ bits, where $\lambda_s$ is the security parameter, and it is independent of the number of levels in the ...
Tsz Hon Yuen, Victor K. Wei
core  

Identity based cryptography from pairings. [PDF]

open access: yes, 2006
Yuen Tsz Hon.Thesis (M.Phil.)--Chinese University of Hong Kong, 2006.Includes bibliographical references (leaves 109-122).Abstracts in English and Chinese.Abstract --- p.iAcknowledgement --- p.iiiList of Notations --- p.viiiChapter 1 --- Introduction -

core  

High Security by using Triple Wrapping Feature and their Comparison [PDF]

open access: yes, 2015
In the age of information, cryptography is a predominant obligation for the security of our documents. Cryptography inclusive of authentication, integrity, confidentiality and non-repudiation has lot to offer.
Naveen Choudhary, Pooja Lal Mundaniya
core   +1 more source

A Comprehensive Survey on Security and Privacy for Electronic Health Data. [PDF]

open access: yesInt J Environ Res Public Health, 2021
Oh SR, Seo YD, Lee E, Kim YG.
europepmc   +1 more source

The Odyssey of Entropy: Cryptography. [PDF]

open access: yesEntropy (Basel), 2022
Zolfaghari B, Bibak K, Koshiba T.
europepmc   +1 more source

Home - About - Disclaimer - Privacy