Results 281 to 290 of about 59,173 (313)
Some of the next articles are maybe not open access.

RFID System Security Using Identity-Based Cryptography

2008
RFID was first proposed as a technology for the automatic identification of objects. However, some recent RFID devices can provide additional information and can be used in other applications. Security requirement is essential in most of the applications. An essential research challenge is to provide efficient protection for RFID systems.
Yan Liang, Chunming Rong
openaire   +1 more source

Simple Identity-Based Cryptography with Mediated RSA

2003
In this paper, we present a general framework for evaluating the performance characteristics of block cipher structures composed of S-boxes and Maximum Distance Separable (MDS) mappings. In particular, we examine nested Substitution-Permutation Networks (SPNs) and Feistel networks with round functions composed of S-boxes and MDS mappings.
Xuhua Ding, Gene Tsudik
openaire   +1 more source

Identity-Based Cryptography for Securing Mobile Phone Calls

2009 International Conference on Advanced Information Networking and Applications Workshops, 2009
In this paper, an identity-based key agreement system for mobile telephony in GSM and UMTS networks is presented. The use of telephone numbers as public keys allows the system to piggyback much of the security overhead for key management to the existing GSM or UMTS infrastructure.
Matthew Smith   +3 more
openaire   +1 more source

Electronic Payment Scheme Using Identity-Based Cryptography

2007
Online electronic wallet with decentralized credential keepers is an architecture allowing users to leave most of the content of his electronic wallet at the security of his residential electronic keeper, while traveling with his mobile phone. This paper proposed a new security scheme for mobile payment using such architecture.
Son Thanh Nguyen, Chunming Rong
openaire   +1 more source

Identity-Based Cryptography Techniques and Applications (A Review)

2013 5th International Conference on Computational Intelligence and Communication Networks, 2013
This paper is reviewed the state of research on the important topic in the field of information interchange that is identity based cryptography which more or less extention of the public key cryptography field. The paper starts with analyzing the fundamental concepts of identity based cryptography techniques, which includes encryption and the ...
Darpan Anand   +2 more
openaire   +1 more source

Identity Based Cryptography for secure AODV routing protocol

2012 20th Telecommunications Forum (TELFOR), 2012
Mobile Ad hoc Network (MANET) is crowd of mobile node communicates and participate in network operation unused to fixed base station each node depended on the other node to deliver the packet that send from source node to destination. Ad hoc network needed secure routing protocols to protect network from many threat in its environment, In this paper we
Ali M. Sagheer, Hadeel M. Taher
openaire   +1 more source

Cloud Access Secure with Identity Based Cryptography

2015
With the fast evolution of networks and Internet, appeared the concept of the Cloud, the requirements in terms of safety become more and more essential. This requires the introduction of advanced authentication methods, access control and identity management, while respecting the constraints of the services offered by this evolution, such as data ...
Houria Hamadi   +2 more
openaire   +1 more source

Distributed Private-Key Generators for Identity-Based Cryptography

2010
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages. However, an IBE scheme necessarily requires a private-key generator (PKG), which can create private keys for clients, and so can passively eavesdrop on all encrypted communications.
Aniket Kate, Ian Goldberg
openaire   +1 more source

Identity-Based Cryptography for Grid

Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007), 2007
Hongwei Li, Shixin Sun
openaire   +1 more source

Security in quantum cryptography

Reviews of Modern Physics, 2022
Christopher Portmann, Renato Renner
exaly  

Home - About - Disclaimer - Privacy