Results 21 to 30 of about 461,214 (305)
Data transmission in intelligent transportation systems is being challenged by a variety of factors, such as open wireless communication channels, that pose problems related to security, anonymity, and privacy.
Santhosh Kumar Sripathi Venkata Naga +3 more
doaj +1 more source
A PKC-based security architecture for WSN [PDF]
It is an important challenge to find out suitable cryptography for WSN due to limitations of energy, computation capability and storage resources. Considering this sensor feature on limitations of resources, a security architecture based-on public key ...
Yao Jianbo, Yang Chaoqiong
doaj +1 more source
Securing Mobile Ad Hoc Networks Using Enhanced Identity‐Based Cryptography
K. A. Mehr, J. M. Niya
semanticscholar +3 more sources
INTEGRATED CRYPTOGRAPHICAL ACCESS CONTROL OVER NETWORK PROJECT [PDF]
Cryptanalysis is a new ID-based encryption scheme proposed by Meshram. I found a method for factor N, where N is the parameter proposed by Meshram. We also provide a method for retrieving the Secret Master key for Mayshram’s ID-based encryption scheme ...
Yakubu Ajiji Makeri
doaj +1 more source
Efficient Unified Arithmetic for Hardware Cryptography [PDF]
The basic arithmetic operations (i.e. addition, multiplication, and inversion) in finite fields, GF(q), where q = pk and p is a prime integer, have several applications in cryptography, such as RSA algorithm, Diffie-Hellman key exchange algorithm [1 ...
Koc, Cetin Kaya +3 more
core +2 more sources
Cloud Computing Security with Identity-Based Authentication Using Heritage-Based Technique [PDF]
More organizations start to give various types of distributed computing administrations for Internet clients in the meantime these administrations additionally bring some security issues.
Kapoor, R. K. (R), Sharma, R. K. (Rishi)
core +1 more source
An Improved Identity-Based Multivariate Signature Scheme Based on Rainbow
Multivariate Public Key Cryptography (MPKC) is one of the main candidates for post-quantum cryptography, especially in the area of signature schemes. In this paper, we instantiate a certificate Identity-Based Signature (IBS) scheme based on Rainbow, one ...
Le Van Luyen
doaj +1 more source
Research on Application of Blockchain and Identity-Based Cryptography
The signing of electronic contracts and the certification of important documents are realized by utilizing blockchain, identity-based cryptography and electronic signature technology. Blockchain technology can realize the data distributed ledgers through
Xingxiong Zhu, Tao Fan
semanticscholar +1 more source
Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage
The key exposure is a serious threat for the security of data integrity auditing. Once the user's private key for auditing is exposed, most of the existing data integrity auditing schemes would inevitably become unable to work. To deal with this problem,
Wenting Shen +3 more
semanticscholar +1 more source
A distributed key establishment scheme for wireless mesh networks using identity-based cryptography [PDF]
In this paper, we propose a secure and efficient key establishment scheme designed with respect to the unique requirements of Wireless Mesh Networks. Our security model is based on Identity-based key establishment scheme without the utilization of a ...
Karaoglan, Duygu +4 more
core +1 more source

