Results 31 to 40 of about 3,647 (300)

Efficient and Anonymous Certificateless Multi-Message and Multi-Receiver Signcryption Scheme Based on ECC

open access: yesIEEE Access, 2019
As the further extension of the multi-receiver signcryption, the multi-message and multi-receiver signcryption allows a sender to simultaneously signcrypt different messages for different receivers in only one logic operation, which makes it more ...
Liaojun Pang, Mengmeng Wei, Huixian Li
doaj   +1 more source

Identity-Based Cryptography

open access: yes, 2023
AbstractIdentity-based encryption systems are characterized by the fact that the public key is easy to remember, and the step of linking the public key to a specific identity is omitted; the identity (e.g., an e-mail address) is the public key. Applications of Identity-based encryption are still relatively rare, although there are now various standards
openaire   +1 more source

Mediated IBC-Based Management System of Identity and Access in Cloud Computing

open access: yesTikrit Journal of Engineering Sciences, 2013
Cloud computing is a new technology that provide to consumers dramatically scalable and virtualized resources, bandwidth, software and hardware on demand. However, cloud computing introduces serious security problems. One of these major security concerns
Sufyan T. Faraja   +2 more
doaj   +1 more source

Complying with the NIST post-quantum cryptography standards and decentralizing artificial intelligence: methodology for quantum-resistant and privacy-preserving digital identity systems

open access: yesFrontiers in Blockchain
IntroductionDigital identity infrastructures used in electronic passports, national eID schemes, and federated authentication systems rely predominantly on centralised registries and classical public key cryptography.
Petar Radanliev   +4 more
doaj   +1 more source

A STUDY OF BILINEAR MAPS IN WIRELESS SENSOR NETWORKS

open access: yesICTACT Journal on Communication Technology, 2017
In the past, a large part of security requirements of wireless sensor networks (WSN) were fulfilled by symmetric cryptography systems. But, today by introduction of new needs in these networks and their security development, researchers of security and ...
Reza Alimoradi   +2 more
doaj   +1 more source

A Review on Identity based Cryptography

open access: yesInternational Journal of Computer Applications, 2015
Security in mobile ad-hoc networks (MANET’s) continues to draw in attention when years of analysis. Recent advances in identity-based cryptography (IBC) sheds light-weight on this drawback and has become widespread as an answer base. In this research it is presenting a comprehensive image and capture the state of the art of IBC security applications in
Heena Heena, Sonia Thakur
openaire   +1 more source

Identity-based incremental signature scheme from lattices

open access: yesTongxin xuebao, 2021
By taking ideas of identity-based cryptography into incremental signatures, the concept of identity-based incremental signature was proposed, and then a specific scheme from lattices was also constructed.The scheme was shown to be provably secure against
Miaomiao TIAN, Jing CHEN, Hong ZHONG
doaj   +2 more sources

An Efficient Heterogeneous Signcryption Scheme from Certificateless to Identity-based Cryptosystem

open access: yesMATEC Web of Conferences, 2017
The heterogeneous signcryption can not only realize the confidentiality and un-forgeability of the information transmission between different public key cryptography environments, but also reduce the communication cost. The proposed scheme uses bilin-ear
Niu Shufen   +4 more
doaj   +1 more source

Enabling Secure Communication in Wireless Body Area Networks with Heterogeneous Authentication Scheme

open access: yesSensors, 2023
Thanks to the widespread availability of Fifth Generation (5G) wireless connectivity, it is now possible to provide preventative or proactive healthcare services from any location and at any time.
Insaf Ullah   +5 more
doaj   +1 more source

The MedSupport Multilevel Intervention to Enhance Support for Pediatric Medication Adherence: Development and Feasibility Testing

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Introduction We developed MedSupport, a multilevel medication adherence intervention designed to address root barriers to medication adherence. This study sought to explore the feasibility and acceptability of the MedSupport intervention strategies to support a future full‐scale randomized controlled trial.
Elizabeth G. Bouchard   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy