Results 221 to 230 of about 407,192 (292)
Some of the next articles are maybe not open access.

Identity Based Cryptography

Indian Journal of Computer Science, 2017
Data security is one of the principle concerns today. Digital signature assumes an important part to guarantee authentication, non-integrity, and non-repudiation on a message. Digital signature can be computed using Rives, Shamir, and Adleman (RSA), and elliptic curve cryptography.
Anil Kumar, Sarvesh Tanwar
openaire   +3 more sources

Identity-Based Cryptography Techniques and Applications (A Review)

2013 5th International Conference on Computational Intelligence and Communication Networks, 2013
This paper is reviewed the state of research on the important topic in the field of information interchange that is identity based cryptography which more or less extention of the public key cryptography field. The paper starts with analyzing the fundamental concepts of identity based cryptography techniques, which includes encryption and the ...
Vineeta Khemchandani   +2 more
openaire   +3 more sources

Identity Based Cryptography for secure AODV routing protocol

2012 20th Telecommunications Forum (TELFOR), 2012
Mobile Ad hoc Network (MANET) is crowd of mobile node communicates and participate in network operation unused to fixed base station each node depended on the other node to deliver the packet that send from source node to destination. Ad hoc network needed secure routing protocols to protect network from many threat in its environment, In this paper we
Ali Makki Sagheer, Hadeel M. Taher
openaire   +3 more sources

EIBC: Enhanced Identity-Based Cryptography, a conceptual design

2012 IEEE International Systems Conference SysCon 2012, 2012
Identity-Based Cryptography (IBC) was originally introduced by A. Shamir in 1984 in a signature scheme. IBC was first applied in the encryption and decryption of messages in the Boneh and Franklin model presented in 2001, which forms the basis of our design.
Victor C. M. Leung, Hasen Nicanfar
openaire   +3 more sources

Secure multicasting in wireless sensor networks using identity based cryptography

Concurrency and Computation, 2022
Security in wireless sensor networks (WSNs) is challenging, owing to resource, computing, and environmental constraints. Researchers have proposed several security systems for multicasting in WSNs, but none have offered foolproof security.
T. Sampradeepraj, V. Devi, S. Raja
semanticscholar   +1 more source

Identity Based Cryptography Using Matrices

Wireless Personal Communications, 2021
A new method of identity (ID) based Elgamal type encryption/decryption is described. The technique uses rectangular integer matrices in finite field Zp, as the private keys. Adoption of modular arithmetic limits the size of the elements of the key matrices while maintaining reasonably high security levels.
B. S. Sahana Raj, Venugopalachar Sridhar
openaire   +2 more sources

A mechanism to ensure identity-based anonymity and authentication for IoT infrastructure using cryptography

Journal of Discrete Mathematical Sciences and Cryptography, 2023
The spread of the Internet of Things (IoT) has caused a variety of devices to communicate with one another, producing enormous volumes of data and nurturing a linked ecosystem.
Suresh Limkar   +5 more
semanticscholar   +1 more source

Framework for Financial Auditing Process Through Blockchain Technology, using Identity Based Cryptography

Information Technology Trends, 2019
With the realizing need to control fraud in the private and the public sector, we observe the past trends of corporate frauds, in terms of money laundering, counterfeit, misrepresentation of financial records by deviating rules, this mostly attracts ...
S. Anwar   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy