Results 1 to 10 of about 461,214 (305)
Electronic Voting Protocol Using Identity-Based Cryptography [PDF]
Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms.
Gina Gallegos-Garcia +1 more
doaj +4 more sources
Vehicular Ad hoc Networks (VANET) broadcast messages regarding road and environmental conditions. Due to its design, VANET inadvertently introduced security and privacy issues.
Mahmood A. Al-Shareeda +4 more
doaj +4 more sources
Using Identity-Based Cryptography as a Foundation for an Effective and Secure Cloud Model for E-Health. [PDF]
Nowadays, one of the most popular applications is cloud computing for storing data and information through World Wide Web. Since cloud computing has become available, users are rapidly increasing. Cloud computing enables users to obtain a better and more
Mittal S +7 more
europepmc +2 more sources
Cross-platform Identity-based Cryptography using WebAssembly [PDF]
—The explosive spread of the devices connected to the Internet has increased the need for efficient and portable cryptographic routines. Despite this fact, truly platform-independent implementations are still hard to find.
Ádám Vécsi, Attila Bagossy, A. Pethő
semanticscholar +3 more sources
ARIBC: Online Reporting Based on Identity-Based Cryptography [PDF]
The reporting of incidents of misconduct, violence, sexual assault, harassment, and other types of crime that constitute a major concern in modern society is of significant value when investigating such incidents.
Athanasios Goudosis, Sokratis Katsikas
doaj +2 more sources
Biometric identity-based cryptography for e-Government environment [PDF]
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tend to be the main ...
Aljeaid, D, Ma, X, Langensiepen, C
openaire +3 more sources
Integrating Identity-Based Cryptography In Ims Service Authentication
13Pages
Abid, Mohamed +3 more
openaire +8 more sources
Modelling and Simulation of a Biometric Identity-Based Cryptography [PDF]
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tend to be the main ...
Aljeaid, D, Ma, X, Langensiepen, C
openaire +5 more sources
Identity based cryptography from bilinear pairings [PDF]
This report contains an overview of two related areas of research in cryptography which have been prolific in significant advances in recent years. The first of these areas is pairing based cryptography. Bilinear pairings over elliptic curves were initially used as formal mathematical tools and later as cryptanalysis tools that rendered supersingular ...
Barbosa, Manuel
openaire +3 more sources
Anonymous Data Sharing and Access Control Based on Blockchain and Attribute-Based Cryptography [PDF]
Information security and privacy protection are critical requirements in the era of big data. Identity-based cryptography is a type of public-key cryptography that solves the main management problem of the traditional public key infrastructure.However ...
Jingyi WANG, Baixiang LIU, Ning FANG, Lingqi PENG
doaj +1 more source

