Results 1 to 10 of about 407,192 (292)
Using Identity-Based Cryptography as a Foundation for an Effective and Secure Cloud Model for E-Health. [PDF]
Nowadays, one of the most popular applications is cloud computing for storing data and information through World Wide Web. Since cloud computing has become available, users are rapidly increasing. Cloud computing enables users to obtain a better and more
Mittal S+7 more
europepmc +4 more sources
Modelling and simulation of a biometric identity-based cryptography [PDF]
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks.
Aljeaid, D, Langensiepen, C, Ma, X
core +6 more sources
Integrating identity-based cryptography in IMS service authentication
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the research community. Although, the security and data privacy aspects are very
Abid, Mohamed+3 more
core +10 more sources
Biometric identity-based cryptography for e-Government environment [PDF]
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks.
Aljeaid, D, Langensiepen, C, Ma, X
core +6 more sources
Research on Application of Blockchain and Identity-Based Cryptography
The signing of electronic contracts and the certification of important documents are realized by utilizing blockchain, identity-based cryptography and electronic signature technology. Blockchain technology can realize the data distributed ledgers through the entire system nodes, the whole processes, and the entire transactions.
Xingxiong Zhu, Tao Fan
semanticscholar +4 more sources
Electronic Voting Protocol Using Identity-Based Cryptography. [PDF]
Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable
Gallegos-Garcia G, Tapia-Recillas H.
europepmc +7 more sources
This chapter is devoted to giving a brief introduction to identity-based cryptography (IBC), which presents a nice solution for some problems that limit the wide deployment of public-key cryptography, in particular, the problem of binding public keys with user identities.
J. G. Pardo
semanticscholar +5 more sources
Identity-Based Cryptography for Grid Security [PDF]
The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure resource allocation to these members. Identity-based cryptography (IBC) has some attractive properties which seem to align well with the demands of grid computing.
Hoon Wei Lim, Kenneth G. Paterson
openalex +4 more sources
Formal Language Identity-based Cryptography
The rapid growth of the digital economy makes finegrained access control more and more challenging. One of the most impacted areas is cloud computing, which for security purposes requires cryptographic access control. Currently, the best solution for that is the use of Attribute-based Cryptography, which allows the definition of access policies, based ...
Ádám Vécsi, Attila Pethő
openalex +4 more sources
Using Identity-Based Cryptography in Mobile Applications [PDF]
arXiv admin note: substantial text overlap with arXiv:2208 ...
V. Mora-Afonso, Pino Caballero-Gil
openaire +4 more sources