Results 21 to 30 of about 461,214 (305)

A Comprehensive Survey on Certificate-Less Authentication Schemes for Vehicular Ad hoc Networks in Intelligent Transportation Systems

open access: yesSensors, 2023
Data transmission in intelligent transportation systems is being challenged by a variety of factors, such as open wireless communication channels, that pose problems related to security, anonymity, and privacy.
Santhosh Kumar Sripathi Venkata Naga   +3 more
doaj   +1 more source

A PKC-based security architecture for WSN [PDF]

open access: yesMATEC Web of Conferences, 2020
It is an important challenge to find out suitable cryptography for WSN due to limitations of energy, computation capability and storage resources. Considering this sensor feature on limitations of resources, a security architecture based-on public key ...
Yao Jianbo, Yang Chaoqiong
doaj   +1 more source

INTEGRATED CRYPTOGRAPHICAL ACCESS CONTROL OVER NETWORK PROJECT [PDF]

open access: yesActa Informatica Malaysia, 2020
Cryptanalysis is a new ID-based encryption scheme proposed by Meshram. I found a method for factor N, where N is the parameter proposed by Meshram. We also provide a method for retrieving the Secret Master key for Mayshram’s ID-based encryption scheme ...
Yakubu Ajiji Makeri
doaj   +1 more source

Efficient Unified Arithmetic for Hardware Cryptography [PDF]

open access: yes, 2008
The basic arithmetic operations (i.e. addition, multiplication, and inversion) in finite fields, GF(q), where q = pk and p is a prime integer, have several applications in cryptography, such as RSA algorithm, Diffie-Hellman key exchange algorithm [1 ...
Koc, Cetin Kaya   +3 more
core   +2 more sources

Cloud Computing Security with Identity-Based Authentication Using Heritage-Based Technique [PDF]

open access: yes, 2017
More organizations start to give various types of distributed computing administrations for Internet clients in the meantime these administrations additionally bring some security issues.
Kapoor, R. K. (R), Sharma, R. K. (Rishi)
core   +1 more source

An Improved Identity-Based Multivariate Signature Scheme Based on Rainbow

open access: yesCryptography, 2019
Multivariate Public Key Cryptography (MPKC) is one of the main candidates for post-quantum cryptography, especially in the area of signature schemes. In this paper, we instantiate a certificate Identity-Based Signature (IBS) scheme based on Rainbow, one ...
Le Van Luyen
doaj   +1 more source

Research on Application of Blockchain and Identity-Based Cryptography

open access: yesIOP Conference Series: Earth and Environment, 2019
The signing of electronic contracts and the certification of important documents are realized by utilizing blockchain, identity-based cryptography and electronic signature technology. Blockchain technology can realize the data distributed ledgers through
Xingxiong Zhu, Tao Fan
semanticscholar   +1 more source

Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage

open access: yesIEEE Transactions on Dependable and Secure Computing, 2023
The key exposure is a serious threat for the security of data integrity auditing. Once the user's private key for auditing is exposed, most of the existing data integrity auditing schemes would inevitably become unable to work. To deal with this problem,
Wenting Shen   +3 more
semanticscholar   +1 more source

A distributed key establishment scheme for wireless mesh networks using identity-based cryptography [PDF]

open access: yes, 2010
In this paper, we propose a secure and efficient key establishment scheme designed with respect to the unique requirements of Wireless Mesh Networks. Our security model is based on Identity-based key establishment scheme without the utilization of a ...
Karaoglan, Duygu   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy