Results 11 to 20 of about 407,192 (292)

Adaptive Secure Cross-Cloud Data Collaboration with Identity-Based Cryptography and Conditional Proxy Re-Encryption [PDF]

open access: goldSecur. Commun. Networks, 2018
Data collaboration in cloud computing is more and more popular nowadays, and proxy deployment schemes are employed to realize cross-cloud data collaboration.
Qinlong Huang   +3 more
openalex   +2 more sources

On Identity-Based Cryptography and Grid Computing [PDF]

open access: bronze, 2004
In this exploratory paper we consider the use of Identity-Based Cryptography (IBC) in a Grid security architecture. IBC has properties that align well with the demands of Grid computing and we illustrate some trade-offs in deploying IBC within a Grid system.
Hoon Wei Lim, Matthew J. B. Robshaw
openalex   +3 more sources

Security and Privacy Schemes in Vehicular Ad-Hoc Network With Identity-Based Cryptography Approach: A Survey [PDF]

open access: goldIEEE Access, 2021
Vehicular Ad hoc Networks (VANET) broadcast messages regarding road and environmental conditions. Due to its design, VANET inadvertently introduced security and privacy issues.
‪Mahmood A. Al-Shareeda‬‏   +4 more
openalex   +2 more sources

Cross-platform Identity-based Cryptography using WebAssembly [PDF]

open access: yesInfocommunications journal, 2019
The explosive spread of the devices connected to the Internet has increased the need for efficient and portable cryptographic routines. Despite this fact, truly platformindependent implementations are still hard to find. In this paper, an Identitybased Cryptography library, called CryptID is introduced.
Vécsi, Ádám   +2 more
openaire   +3 more sources

ARIBC: Online Reporting Based on Identity-Based Cryptography [PDF]

open access: goldFuture Internet, 2021
The reporting of incidents of misconduct, violence, sexual assault, harassment, and other types of crime that constitute a major concern in modern society is of significant value when investigating such incidents. Unfortunately, people involved in such incidents, either as witnesses or victims, are often reluctant to report them when such reporting ...
Athanasios Goudosis, Sokratis Katsikas
openalex   +4 more sources

Secure Mobility Management for MIPv6 with Identity-Based Cryptography [PDF]

open access: bronze, 2015
Mobile IPv6 is an improvement of the original IPv6 protocol, and provides mobility support for IPv6 nodes. However, the security of mobility management is one of the most important issues for MIPv6. Traditional MIPv6 uses IPSec to protect the mobility management, while the dependence on the mechanism of the pre-shared key or certificate limits its ...
Nan Guo, Fangting Peng, Tianhan Gao
openalex   +4 more sources

GSM Security Using Identity-based Cryptography

open access: green, 2009
Current security model in Global System for Mobile Communications (GSM) predominantly use symmetric key cryptography. The rapid advancement of Internet technology facilitates online trading, banking, downloading, emailing using resource-constrained handheld devices such as personal digital assistants and cell phones. However, these applications require
Animesh Agarwal   +2 more
openalex   +4 more sources

Identity-Based Cryptography on Hidden-Order Groups

open access: goldProcedia Engineering, 2012
AbstractRecently, Saxena and Soh presented one novel cryptographic primitive based on associative one-way functions, called oracle-based group with infeasible inversion (O-GII), and it requires the order of group is hidden. In this paper, we propose three ID-based cryptographic schemes, such as ID-based non-interactive key sharing (ID-NIKS) scheme ...
Chanlgu Lin
openalex   +3 more sources

A Review on Identity based Cryptography

open access: bronzeInternational Journal of Computer Applications, 2015
Security in mobile ad-hoc networks (MANET’s) continues to draw in attention when years of analysis. Recent advances in identity-based cryptography (IBC) sheds light-weight on this drawback and has become widespread as an answer base. In this research it is presenting a comprehensive image and capture the state of the art of IBC security applications in
Sonia Thakur, Heena Heena
openalex   +3 more sources

Achieving Identity-Based Cryptography in a Personal Digital Assistant Device [PDF]

open access: goldJournal of Applied Research and Technology, 2011
Continuous technological advances have allowed that mobile devices, such as Personal Digital Assistants (PDAs), can executesophisticated applications that more often than not must be equipped with a layer of security that should include theconfidentiality and the authentication services within its repertory.
L. Martínez-Ramos   +2 more
openalex   +5 more sources

Home - About - Disclaimer - Privacy