Results 11 to 20 of about 407,192 (292)
Adaptive Secure Cross-Cloud Data Collaboration with Identity-Based Cryptography and Conditional Proxy Re-Encryption [PDF]
Data collaboration in cloud computing is more and more popular nowadays, and proxy deployment schemes are employed to realize cross-cloud data collaboration.
Qinlong Huang+3 more
openalex +2 more sources
On Identity-Based Cryptography and Grid Computing [PDF]
In this exploratory paper we consider the use of Identity-Based Cryptography (IBC) in a Grid security architecture. IBC has properties that align well with the demands of Grid computing and we illustrate some trade-offs in deploying IBC within a Grid system.
Hoon Wei Lim, Matthew J. B. Robshaw
openalex +3 more sources
Security and Privacy Schemes in Vehicular Ad-Hoc Network With Identity-Based Cryptography Approach: A Survey [PDF]
Vehicular Ad hoc Networks (VANET) broadcast messages regarding road and environmental conditions. Due to its design, VANET inadvertently introduced security and privacy issues.
Mahmood A. Al-Shareeda+4 more
openalex +2 more sources
Cross-platform Identity-based Cryptography using WebAssembly [PDF]
The explosive spread of the devices connected to the Internet has increased the need for efficient and portable cryptographic routines. Despite this fact, truly platformindependent implementations are still hard to find. In this paper, an Identitybased Cryptography library, called CryptID is introduced.
Vécsi, Ádám+2 more
openaire +3 more sources
ARIBC: Online Reporting Based on Identity-Based Cryptography [PDF]
The reporting of incidents of misconduct, violence, sexual assault, harassment, and other types of crime that constitute a major concern in modern society is of significant value when investigating such incidents. Unfortunately, people involved in such incidents, either as witnesses or victims, are often reluctant to report them when such reporting ...
Athanasios Goudosis, Sokratis Katsikas
openalex +4 more sources
Secure Mobility Management for MIPv6 with Identity-Based Cryptography [PDF]
Mobile IPv6 is an improvement of the original IPv6 protocol, and provides mobility support for IPv6 nodes. However, the security of mobility management is one of the most important issues for MIPv6. Traditional MIPv6 uses IPSec to protect the mobility management, while the dependence on the mechanism of the pre-shared key or certificate limits its ...
Nan Guo, Fangting Peng, Tianhan Gao
openalex +4 more sources
GSM Security Using Identity-based Cryptography
Current security model in Global System for Mobile Communications (GSM) predominantly use symmetric key cryptography. The rapid advancement of Internet technology facilitates online trading, banking, downloading, emailing using resource-constrained handheld devices such as personal digital assistants and cell phones. However, these applications require
Animesh Agarwal+2 more
openalex +4 more sources
Identity-Based Cryptography on Hidden-Order Groups
AbstractRecently, Saxena and Soh presented one novel cryptographic primitive based on associative one-way functions, called oracle-based group with infeasible inversion (O-GII), and it requires the order of group is hidden. In this paper, we propose three ID-based cryptographic schemes, such as ID-based non-interactive key sharing (ID-NIKS) scheme ...
Chanlgu Lin
openalex +3 more sources
A Review on Identity based Cryptography
Security in mobile ad-hoc networks (MANET’s) continues to draw in attention when years of analysis. Recent advances in identity-based cryptography (IBC) sheds light-weight on this drawback and has become widespread as an answer base. In this research it is presenting a comprehensive image and capture the state of the art of IBC security applications in
Sonia Thakur, Heena Heena
openalex +3 more sources
Achieving Identity-Based Cryptography in a Personal Digital Assistant Device [PDF]
Continuous technological advances have allowed that mobile devices, such as Personal Digital Assistants (PDAs), can executesophisticated applications that more often than not must be equipped with a layer of security that should include theconfidentiality and the authentication services within its repertory.
L. Martínez-Ramos+2 more
openalex +5 more sources