Results 21 to 30 of about 58,711 (310)

Two Efficient Constructions for Biometric-Based Signature in Identity-Based Setting Using Bilinear Pairings

open access: yesIEEE Access, 2021
It is always an attractive topic for researchers that biometric traits are used to represent the identities of users in identity-based cryptography due to their unique and inherent properties.
Xiwei Shan, Lin You, Gengran Hu
doaj   +1 more source

Post-quantum identity-based authenticated multiple key agreement protocol

open access: yesETRI Journal, 2023
Authenticated multiple key agreement (AMKA) protocols provide participants with multiple session keys after one round of authentication. Many schemes use Diffie-Hellman or authenticated key agreement schemes that rely on hard integer factorizations that ...
Yang Yang   +3 more
doaj   +1 more source

A Comprehensive Survey on Certificate-Less Authentication Schemes for Vehicular Ad hoc Networks in Intelligent Transportation Systems

open access: yesSensors, 2023
Data transmission in intelligent transportation systems is being challenged by a variety of factors, such as open wireless communication channels, that pose problems related to security, anonymity, and privacy.
Santhosh Kumar Sripathi Venkata Naga   +3 more
doaj   +1 more source

Identity-Based Cryptography for Grid Security [PDF]

open access: yesFirst International Conference on e-Science and Grid Computing (e-Science'05), 2006
The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure resource allocation to these members. Identity-based cryptography (IBC) has some attractive properties which seem to align well with the demands of grid computing.
Hoon Wei Lim, Kenneth G. Paterson
openaire   +1 more source

A PKC-based security architecture for WSN [PDF]

open access: yesMATEC Web of Conferences, 2020
It is an important challenge to find out suitable cryptography for WSN due to limitations of energy, computation capability and storage resources. Considering this sensor feature on limitations of resources, a security architecture based-on public key ...
Yao Jianbo, Yang Chaoqiong
doaj   +1 more source

INTEGRATED CRYPTOGRAPHICAL ACCESS CONTROL OVER NETWORK PROJECT [PDF]

open access: yesActa Informatica Malaysia, 2020
Cryptanalysis is a new ID-based encryption scheme proposed by Meshram. I found a method for factor N, where N is the parameter proposed by Meshram. We also provide a method for retrieving the Secret Master key for Mayshram’s ID-based encryption scheme ...
Yakubu Ajiji Makeri
doaj   +1 more source

Efficient Unified Arithmetic for Hardware Cryptography [PDF]

open access: yes, 2008
The basic arithmetic operations (i.e. addition, multiplication, and inversion) in finite fields, GF(q), where q = pk and p is a prime integer, have several applications in cryptography, such as RSA algorithm, Diffie-Hellman key exchange algorithm [1 ...
Koc, Cetin Kaya   +3 more
core   +2 more sources

An Improved Identity-Based Multivariate Signature Scheme Based on Rainbow

open access: yesCryptography, 2019
Multivariate Public Key Cryptography (MPKC) is one of the main candidates for post-quantum cryptography, especially in the area of signature schemes. In this paper, we instantiate a certificate Identity-Based Signature (IBS) scheme based on Rainbow, one ...
Le Van Luyen
doaj   +1 more source

A distributed key establishment scheme for wireless mesh networks using identity-based cryptography [PDF]

open access: yes, 2010
In this paper, we propose a secure and efficient key establishment scheme designed with respect to the unique requirements of Wireless Mesh Networks. Our security model is based on Identity-based key establishment scheme without the utilization of a ...
Karaoglan, Duygu   +4 more
core   +1 more source

PRESTvO: PRivacy Enabled Smartphone Based Access to Vehicle On-Board Units

open access: yesIEEE Access, 2020
Smartphones are quickly moving toward complementing or even replacing traditional car keys. We advocate a role-based access control policy mixed with attributes that facilitates access to various functionalities of vehicular on-board units from ...
Bogdan Groza   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy