Results 271 to 280 of about 58,711 (310)
Some of the next articles are maybe not open access.
RFID System Security Using Identity-Based Cryptography
2010 Third International Symposium on Intelligent Information Technology and Security Informatics, 2010Two-way authentication is one of the key solutions to improve the security of RFID Tag/Reader due to many attacks on HB, HB+ and HB++. In this paper, we analysis HB, HB+ and HB++ and propose a modified protocol, a two-way authentication to avoid the attacks.
Youqin Chen, Zhide Chen, Li Xu
openaire +1 more source
ZigBee Security Using Identity-Based Cryptography
2007ZigBee is a specification defining a set of protocols and architecture for monitoring and control networks. With the advantages of high availability, low cost and low power consumption, ZigBee is ideal for both residential and industrial settings. This paper proposes an application of identity-based cryptography for security in ZigBee networks.
Son Thanh Nguyen, Chunming Rong
openaire +1 more source
Pseudonym management using mediated identity-based cryptography
Proceedings of the 2005 workshop on Digital identity management, 2005Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third parties in order to access these applications. Widespread acceptance of such services may therefore depend on how privacy sensitive information will be handled in order to ...
Thibault Candebat +2 more
openaire +1 more source
E-passport EAC scheme based on Identity-Based Cryptography
Information Processing Letters, 2010zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Li, C. H. +3 more
openaire +1 more source
Introduction to Identity-Based Cryptography
2009Identity-based cryptography is a new development of public-key cryptography. It was first proposed by Adi Shamir at CRYPTO'84. However, it took the cryptographic community a long while to produce effective identity-based cryptosystems. Indeed, this solution only appeared at the beginning of the twenty-first century.
openaire +1 more source
Identity-Based Cryptography in Public Key Management
2004To guarantee the authenticity of public keys, traditional PKC (Public Key Cryptography) requires certificates signed by a CA (Certification Authority). However, the management of infrastructure supporting certificates is the main complaint against traditional PKC.
Yum, DH, Lee, PJ
openaire +2 more sources
RFID System Security Using Identity-Based Cryptography
2008RFID was first proposed as a technology for the automatic identification of objects. However, some recent RFID devices can provide additional information and can be used in other applications. Security requirement is essential in most of the applications. An essential research challenge is to provide efficient protection for RFID systems.
Yan Liang, Chunming Rong
openaire +1 more source
Simple Identity-Based Cryptography with Mediated RSA
2003In this paper, we present a general framework for evaluating the performance characteristics of block cipher structures composed of S-boxes and Maximum Distance Separable (MDS) mappings. In particular, we examine nested Substitution-Permutation Networks (SPNs) and Feistel networks with round functions composed of S-boxes and MDS mappings.
Xuhua Ding, Gene Tsudik
openaire +1 more source
Identity-Based Cryptography for Securing Mobile Phone Calls
2009 International Conference on Advanced Information Networking and Applications Workshops, 2009In this paper, an identity-based key agreement system for mobile telephony in GSM and UMTS networks is presented. The use of telephone numbers as public keys allows the system to piggyback much of the security overhead for key management to the existing GSM or UMTS infrastructure.
Matthew Smith +3 more
openaire +1 more source
Electronic Payment Scheme Using Identity-Based Cryptography
2007Online electronic wallet with decentralized credential keepers is an architecture allowing users to leave most of the content of his electronic wallet at the security of his residential electronic keeper, while traveling with his mobile phone. This paper proposed a new security scheme for mobile payment using such architecture.
Son Thanh Nguyen, Chunming Rong
openaire +1 more source

