Results 1 to 10 of about 58,711 (310)

Electronic Voting Protocol Using Identity-Based Cryptography [PDF]

open access: goldThe Scientific World Journal, 2015
Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms.
Gina Gallegos-Garcia   +1 more
doaj   +6 more sources

Modelling and Simulation of a Biometric Identity-Based Cryptography [PDF]

open access: hybridInternational Journal of Advanced Research in Artificial Intelligence, 2014
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tend to be the main ...
Dania Aljeaid   +2 more
core   +6 more sources

Security and Privacy Schemes in Vehicular Ad-Hoc Network With Identity-Based Cryptography Approach: A Survey [PDF]

open access: goldIEEE Access, 2021
Vehicular Ad hoc Networks (VANET) broadcast messages regarding road and environmental conditions. Due to its design, VANET inadvertently introduced security and privacy issues.
Mahmood A. Al-Shareeda   +4 more
doaj   +2 more sources

GSM Security Using Identity-based Cryptography [PDF]

open access: green, 2009
Current security model in Global System for Mobile Communications (GSM) predominantly use symmetric key cryptography. The rapid advancement of Internet technology facilitates online trading, banking, downloading, emailing using resource-constrained handheld devices such as personal digital assistants and cell phones. However, these applications require
Animesh Agarwal   +2 more
openalex   +3 more sources

ARIBC: Online Reporting Based on Identity-Based Cryptography [PDF]

open access: yesFuture Internet, 2021
The reporting of incidents of misconduct, violence, sexual assault, harassment, and other types of crime that constitute a major concern in modern society is of significant value when investigating such incidents.
Athanasios Goudosis, Sokratis Katsikas
doaj   +2 more sources

Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids. [PDF]

open access: goldPLoS ONE, 2016
In a smart grid, the power service provider enables the expected power generation amount to be measured according to current power consumption, thus stabilizing the power system.
Liping Zhang, Shanyu Tang, He Luo
doaj   +3 more sources

Using Identity-Based Cryptography as a Foundation for an Effective and Secure Cloud Model for E-Health. [PDF]

open access: hybridComput Intell Neurosci, 2022
Mittal S   +7 more
europepmc   +3 more sources

Cross-platform Identity-based Cryptography using WebAssembly [PDF]

open access: bronzeInfocommunications journal, 2019
The explosive spread of the devices connected to the Internet has increased the need for efficient and portable cryptographic routines. Despite this fact, truly platformindependent implementations are still hard to find. In this paper, an Identitybased Cryptography library, called CryptID is introduced.
Ádám Vécsi   +2 more
openalex   +3 more sources

Using Identity-Based Cryptography in Mobile Applications [PDF]

open access: green, 2013
arXiv admin note: substantial text overlap with arXiv:2208 ...
V. Mora-Afonso, Pino Caballero‐Gil
openalex   +3 more sources

Home - About - Disclaimer - Privacy