Results 1 to 10 of about 461,214 (305)

Electronic Voting Protocol Using Identity-Based Cryptography [PDF]

open access: yesThe Scientific World Journal, 2015
Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms.
Gina Gallegos-Garcia   +1 more
doaj   +4 more sources

Security and Privacy Schemes in Vehicular Ad-Hoc Network With Identity-Based Cryptography Approach: A Survey

open access: yesIEEE Access, 2021
Vehicular Ad hoc Networks (VANET) broadcast messages regarding road and environmental conditions. Due to its design, VANET inadvertently introduced security and privacy issues.
Mahmood A. Al-Shareeda   +4 more
doaj   +4 more sources

Using Identity-Based Cryptography as a Foundation for an Effective and Secure Cloud Model for E-Health. [PDF]

open access: yesComput Intell Neurosci, 2022
Nowadays, one of the most popular applications is cloud computing for storing data and information through World Wide Web. Since cloud computing has become available, users are rapidly increasing. Cloud computing enables users to obtain a better and more
Mittal S   +7 more
europepmc   +2 more sources

Cross-platform Identity-based Cryptography using WebAssembly [PDF]

open access: yesInfocommunications journal, 2019
—The explosive spread of the devices connected to the Internet has increased the need for efficient and portable cryptographic routines. Despite this fact, truly platform-independent implementations are still hard to find.
Ádám Vécsi, Attila Bagossy, A. Pethő
semanticscholar   +3 more sources

ARIBC: Online Reporting Based on Identity-Based Cryptography [PDF]

open access: yesFuture Internet, 2021
The reporting of incidents of misconduct, violence, sexual assault, harassment, and other types of crime that constitute a major concern in modern society is of significant value when investigating such incidents.
Athanasios Goudosis, Sokratis Katsikas
doaj   +2 more sources

Biometric identity-based cryptography for e-Government environment [PDF]

open access: yes2014 Science and Information Conference, 2014
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tend to be the main ...
Aljeaid, D, Ma, X, Langensiepen, C
openaire   +3 more sources

Modelling and Simulation of a Biometric Identity-Based Cryptography [PDF]

open access: yesInternational Journal of Advanced Research in Artificial Intelligence, 2014
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tend to be the main ...
Aljeaid, D, Ma, X, Langensiepen, C
openaire   +5 more sources

Identity based cryptography from bilinear pairings [PDF]

open access: yes, 2005
This report contains an overview of two related areas of research in cryptography which have been prolific in significant advances in recent years. The first of these areas is pairing based cryptography. Bilinear pairings over elliptic curves were initially used as formal mathematical tools and later as cryptanalysis tools that rendered supersingular ...
Barbosa, Manuel
openaire   +3 more sources

Anonymous Data Sharing and Access Control Based on Blockchain and Attribute-Based Cryptography [PDF]

open access: yesJisuanji gongcheng, 2023
Information security and privacy protection are critical requirements in the era of big data. Identity-based cryptography is a type of public-key cryptography that solves the main management problem of the traditional public key infrastructure.However ...
Jingyi WANG, Baixiang LIU, Ning FANG, Lingqi PENG
doaj   +1 more source

Home - About - Disclaimer - Privacy