Results 251 to 260 of about 407,192 (292)
Some of the next articles are maybe not open access.
Applicability of identity-based cryptography for disruption-tolerant networking
Proceedings of the 1st international MobiSys workshop on Mobile opportunistic networking, 2007Traditional approaches for communication security do not work well in disruption- and delay-tolerant networks (DTNs). Recently, the use of identity-based cryptography (IBC) has been proposed as one way to help solve some of the DTN security issues. We analyze the applicability of IBC in this context and conclude that for authentication and integrity ...
Jörg Ott+4 more
openaire +2 more sources
Improving WTLS Protocol Using Identity-Based Cryptography
2012 International Conference on Management of e-Commerce and e-Government, 2012IBC is emerging as an important contender to traditional public key cryptography for its attractive properties. But the Wireless Transport Layer Security (WTLS) protocol does not support it at present. To resolve this problem, an improved WTLS protocol based on IBC (IB_WTLS) is proposed.
Bing-Xian Ma+3 more
openaire +2 more sources
Cloud Access Secure with Identity Based Cryptography
2015With the fast evolution of networks and Internet, appeared the concept of the Cloud, the requirements in terms of safety become more and more essential. This requires the introduction of advanced authentication methods, access control and identity management, while respecting the constraints of the services offered by this evolution, such as data ...
Abdelkrim Khireddine+2 more
openaire +1 more source
RFID System Security Using Identity-Based Cryptography
2010 Third International Symposium on Intelligent Information Technology and Security Informatics, 2010Two-way authentication is one of the key solutions to improve the security of RFID Tag/Reader due to many attacks on HB, HB+ and HB++. In this paper, we analysis HB, HB+ and HB++ and propose a modified protocol, a two-way authentication to avoid the attacks.
Chen Youqin, Li Xu, Zhide Chen
openaire +2 more sources
Pseudonym management using mediated identity-based cryptography
Proceedings of the 2005 workshop on Digital identity management, 2005Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third parties in order to access these applications. Widespread acceptance of such services may therefore depend on how privacy sensitive information will be handled in order to ...
Thibault Candebat+2 more
openaire +2 more sources
RFID System Security Using Identity-Based Cryptography
2008RFID was first proposed as a technology for the automatic identification of objects. However, some recent RFID devices can provide additional information and can be used in other applications. Security requirement is essential in most of the applications. An essential research challenge is to provide efficient protection for RFID systems.
Chunming Rong, Yan Liang
openaire +2 more sources
Electronic Payment Scheme Using Identity-Based Cryptography
2007Online electronic wallet with decentralized credential keepers is an architecture allowing users to leave most of the content of his electronic wallet at the security of his residential electronic keeper, while traveling with his mobile phone. This paper proposed a new security scheme for mobile payment using such architecture.
Chunming Rong, Son T. Nguyen
openaire +2 more sources
Private Communication Based on Hierarchical Identity-Based Cryptography
2018Public Key Infrastructure (PKI) is an important tool for securing information in the communication. Presently, a PKI framework demonstrates a pattern toward an emerging worldwide PKI which turns out to be more complicated. In this paper, we address the issue of a contact acquiring a message that it missed, from different contacts of the client while ...
D. Kalyani, R. Sridevi
openaire +2 more sources
Securing Mobile Phone Calls with Identity-Based Cryptography
2009In this paper, an identity-based key agreement system and its implementation for mobile telephony in GSM and UMTS networks is presented. The use of telephone numbers as public keys allows the system to piggyback much of the security overhead for key management to the existing GSM or UMTS infrastructure.
Bernd Freisleben+3 more
openaire +2 more sources
Toward hierarchical identity-based cryptography for tactical networks
IEEE MILCOM 2004. Military Communications Conference, 2004., 2005The nature of the tactical network environment requires using secure, reliable, highly efficient, low delay communication protocols. This is particularly true of cryptographic key management protocols that must be successfully completed prior to the start of sensor and C4ISR communications.
openaire +2 more sources