Results 1 to 10 of about 407,192 (292)

Using Identity-Based Cryptography as a Foundation for an Effective and Secure Cloud Model for E-Health. [PDF]

open access: goldComput Intell Neurosci, 2022
Nowadays, one of the most popular applications is cloud computing for storing data and information through World Wide Web. Since cloud computing has become available, users are rapidly increasing. Cloud computing enables users to obtain a better and more
Mittal S   +7 more
europepmc   +4 more sources

Modelling and simulation of a biometric identity-based cryptography [PDF]

open access: hybridInternational Journal of Advanced Research in Artificial Intelligence, 2014
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks.
Aljeaid, D, Langensiepen, C, Ma, X
core   +6 more sources

Integrating identity-based cryptography in IMS service authentication

open access: green, 2009
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the research community. Although, the security and data privacy aspects are very
Abid, Mohamed   +3 more
core   +10 more sources

Biometric identity-based cryptography for e-Government environment [PDF]

open access: green2014 Science and Information Conference, 2014
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks.
Aljeaid, D, Langensiepen, C, Ma, X
core   +6 more sources

Research on Application of Blockchain and Identity-Based Cryptography

open access: goldIOP Conference Series: Earth and Environmental Science, 2019
The signing of electronic contracts and the certification of important documents are realized by utilizing blockchain, identity-based cryptography and electronic signature technology. Blockchain technology can realize the data distributed ledgers through the entire system nodes, the whole processes, and the entire transactions.
Xingxiong Zhu, Tao Fan
semanticscholar   +4 more sources

Electronic Voting Protocol Using Identity-Based Cryptography. [PDF]

open access: goldScientificWorldJournal, 2015
Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable
Gallegos-Garcia G, Tapia-Recillas H.
europepmc   +7 more sources

Identity-Based Cryptography

open access: green, 2012
This chapter is devoted to giving a brief introduction to identity-based cryptography (IBC), which presents a nice solution for some problems that limit the wide deployment of public-key cryptography, in particular, the problem of binding public keys with user identities.
J. G. Pardo
semanticscholar   +5 more sources

Identity-Based Cryptography for Grid Security [PDF]

open access: greenFirst International Conference on e-Science and Grid Computing (e-Science'05), 2006
The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure resource allocation to these members. Identity-based cryptography (IBC) has some attractive properties which seem to align well with the demands of grid computing.
Hoon Wei Lim, Kenneth G. Paterson
openalex   +4 more sources

Formal Language Identity-based Cryptography

open access: greenRad Hrvatske akademije znanosti i umjetnosti Matematičke znanosti, 2021
The rapid growth of the digital economy makes finegrained access control more and more challenging. One of the most impacted areas is cloud computing, which for security purposes requires cryptographic access control. Currently, the best solution for that is the use of Attribute-based Cryptography, which allows the definition of access policies, based ...
Ádám Vécsi, Attila Pethő
openalex   +4 more sources

Using Identity-Based Cryptography in Mobile Applications [PDF]

open access: yesInternational Conference on European Transnational Education, 2014
arXiv admin note: substantial text overlap with arXiv:2208 ...
V. Mora-Afonso, Pino Caballero-Gil
openaire   +4 more sources

Home - About - Disclaimer - Privacy