Electronic Voting Protocol Using Identity-Based Cryptography [PDF]
Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms.
Gina Gallegos-Garcia +1 more
doaj +6 more sources
Modelling and Simulation of a Biometric Identity-Based Cryptography [PDF]
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tend to be the main ...
Dania Aljeaid +2 more
core +6 more sources
Security and Privacy Schemes in Vehicular Ad-Hoc Network With Identity-Based Cryptography Approach: A Survey [PDF]
Vehicular Ad hoc Networks (VANET) broadcast messages regarding road and environmental conditions. Due to its design, VANET inadvertently introduced security and privacy issues.
Mahmood A. Al-Shareeda +4 more
doaj +2 more sources
GSM Security Using Identity-based Cryptography [PDF]
Current security model in Global System for Mobile Communications (GSM) predominantly use symmetric key cryptography. The rapid advancement of Internet technology facilitates online trading, banking, downloading, emailing using resource-constrained handheld devices such as personal digital assistants and cell phones. However, these applications require
Animesh Agarwal +2 more
openalex +3 more sources
ARIBC: Online Reporting Based on Identity-Based Cryptography [PDF]
The reporting of incidents of misconduct, violence, sexual assault, harassment, and other types of crime that constitute a major concern in modern society is of significant value when investigating such incidents.
Athanasios Goudosis, Sokratis Katsikas
doaj +2 more sources
Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids. [PDF]
In a smart grid, the power service provider enables the expected power generation amount to be measured according to current power consumption, thus stabilizing the power system.
Liping Zhang, Shanyu Tang, He Luo
doaj +3 more sources
Data Sharing Mechanism of Sensors and Actuators of Industrial IoT Based on Blockchain-Assisted Identity-Based Cryptography. [PDF]
Meng Y, Li J.
europepmc +3 more sources
Using Identity-Based Cryptography as a Foundation for an Effective and Secure Cloud Model for E-Health. [PDF]
Mittal S +7 more
europepmc +3 more sources
Cross-platform Identity-based Cryptography using WebAssembly [PDF]
The explosive spread of the devices connected to the Internet has increased the need for efficient and portable cryptographic routines. Despite this fact, truly platformindependent implementations are still hard to find. In this paper, an Identitybased Cryptography library, called CryptID is introduced.
Ádám Vécsi +2 more
openalex +3 more sources
Using Identity-Based Cryptography in Mobile Applications [PDF]
arXiv admin note: substantial text overlap with arXiv:2208 ...
V. Mora-Afonso, Pino Caballero‐Gil
openalex +3 more sources

