Results 281 to 290 of about 58,711 (310)
Some of the next articles are maybe not open access.

Identity-Based Cryptography Techniques and Applications (A Review)

2013 5th International Conference on Computational Intelligence and Communication Networks, 2013
This paper is reviewed the state of research on the important topic in the field of information interchange that is identity based cryptography which more or less extention of the public key cryptography field. The paper starts with analyzing the fundamental concepts of identity based cryptography techniques, which includes encryption and the ...
Darpan Anand   +2 more
openaire   +1 more source

Identity Based Cryptography for secure AODV routing protocol

2012 20th Telecommunications Forum (TELFOR), 2012
Mobile Ad hoc Network (MANET) is crowd of mobile node communicates and participate in network operation unused to fixed base station each node depended on the other node to deliver the packet that send from source node to destination. Ad hoc network needed secure routing protocols to protect network from many threat in its environment, In this paper we
Ali M. Sagheer, Hadeel M. Taher
openaire   +1 more source

Cloud Access Secure with Identity Based Cryptography

2015
With the fast evolution of networks and Internet, appeared the concept of the Cloud, the requirements in terms of safety become more and more essential. This requires the introduction of advanced authentication methods, access control and identity management, while respecting the constraints of the services offered by this evolution, such as data ...
Houria Hamadi   +2 more
openaire   +1 more source

Identity-Based Cryptography: Schemes and Implementations

This comprehensive paper presents a thorough analysis of Identity-Based Cryptography (IBC), focusing on both encryption (IBE) and signature (IBS) schemes, along with novel contributions in threshold implementations and zero-knowledge proofs. We provide detailed mathematical formulations and practical implementations of major IBE schemes including Boneh-
openaire   +1 more source

Distributed Private-Key Generators for Identity-Based Cryptography

2010
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages. However, an IBE scheme necessarily requires a private-key generator (PKG), which can create private keys for clients, and so can passively eavesdrop on all encrypted communications.
Aniket Kate, Ian Goldberg
openaire   +1 more source

Identity-Based Cryptography for Grid

Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007), 2007
Hongwei Li, Shixin Sun
openaire   +1 more source

Security in quantum cryptography

Reviews of Modern Physics, 2022
Christopher Portmann, Renato Renner
exaly  

Identity based cryptography for ad hoc networks

IET Conference Proceedings, 2022
M. Usman Rana   +3 more
openaire   +1 more source

Entanglement-based secure quantum cryptography over 1,120 kilometres

Nature, 2020
Juan Yin, Yu-Huai Li, Sheng-Kai Liao
exaly  

Home - About - Disclaimer - Privacy