Results 281 to 290 of about 59,173 (313)
Some of the next articles are maybe not open access.
RFID System Security Using Identity-Based Cryptography
2008RFID was first proposed as a technology for the automatic identification of objects. However, some recent RFID devices can provide additional information and can be used in other applications. Security requirement is essential in most of the applications. An essential research challenge is to provide efficient protection for RFID systems.
Yan Liang, Chunming Rong
openaire +1 more source
Simple Identity-Based Cryptography with Mediated RSA
2003In this paper, we present a general framework for evaluating the performance characteristics of block cipher structures composed of S-boxes and Maximum Distance Separable (MDS) mappings. In particular, we examine nested Substitution-Permutation Networks (SPNs) and Feistel networks with round functions composed of S-boxes and MDS mappings.
Xuhua Ding, Gene Tsudik
openaire +1 more source
Identity-Based Cryptography for Securing Mobile Phone Calls
2009 International Conference on Advanced Information Networking and Applications Workshops, 2009In this paper, an identity-based key agreement system for mobile telephony in GSM and UMTS networks is presented. The use of telephone numbers as public keys allows the system to piggyback much of the security overhead for key management to the existing GSM or UMTS infrastructure.
Matthew Smith +3 more
openaire +1 more source
Electronic Payment Scheme Using Identity-Based Cryptography
2007Online electronic wallet with decentralized credential keepers is an architecture allowing users to leave most of the content of his electronic wallet at the security of his residential electronic keeper, while traveling with his mobile phone. This paper proposed a new security scheme for mobile payment using such architecture.
Son Thanh Nguyen, Chunming Rong
openaire +1 more source
Identity-Based Cryptography Techniques and Applications (A Review)
2013 5th International Conference on Computational Intelligence and Communication Networks, 2013This paper is reviewed the state of research on the important topic in the field of information interchange that is identity based cryptography which more or less extention of the public key cryptography field. The paper starts with analyzing the fundamental concepts of identity based cryptography techniques, which includes encryption and the ...
Darpan Anand +2 more
openaire +1 more source
Identity Based Cryptography for secure AODV routing protocol
2012 20th Telecommunications Forum (TELFOR), 2012Mobile Ad hoc Network (MANET) is crowd of mobile node communicates and participate in network operation unused to fixed base station each node depended on the other node to deliver the packet that send from source node to destination. Ad hoc network needed secure routing protocols to protect network from many threat in its environment, In this paper we
Ali M. Sagheer, Hadeel M. Taher
openaire +1 more source
Cloud Access Secure with Identity Based Cryptography
2015With the fast evolution of networks and Internet, appeared the concept of the Cloud, the requirements in terms of safety become more and more essential. This requires the introduction of advanced authentication methods, access control and identity management, while respecting the constraints of the services offered by this evolution, such as data ...
Houria Hamadi +2 more
openaire +1 more source
Distributed Private-Key Generators for Identity-Based Cryptography
2010An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages. However, an IBE scheme necessarily requires a private-key generator (PKG), which can create private keys for clients, and so can passively eavesdrop on all encrypted communications.
Aniket Kate, Ian Goldberg
openaire +1 more source
Identity-Based Cryptography for Grid
Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007), 2007Hongwei Li, Shixin Sun
openaire +1 more source
Security in quantum cryptography
Reviews of Modern Physics, 2022Christopher Portmann, Renato Renner
exaly

