Results 31 to 40 of about 407,192 (292)
Cloud Computing Security with Identity-Based Authentication Using Heritage-Based Technique [PDF]
More organizations start to give various types of distributed computing administrations for Internet clients in the meantime these administrations additionally bring some security issues.
Kapoor, R. K. (R), Sharma, R. K. (Rishi)
core +1 more source
Cloud Computing in the Quantum Era [PDF]
Cloud computing has become the prominent technology of this era. Its elasticity, dynamicity, availability, heterogeneity, and pay as you go pricing model has attracted several companies to migrate their businesses' services into the cloud.
Kaiiali, Mustafa+2 more
core +2 more sources
Identity-Based Proxy Signature with Message Recovery over NTRU Lattice
Proxy signature is one of the important primitives of public-key cryptography and plays an essential role in delivering security services in modern communications.
Faguo Wu, Bo Zhou, Xiao Zhang
semanticscholar +1 more source
An identity-based key infrastructure suitable for messaging applications [PDF]
—Identity-based encryption (IBE) systems are relatively recently proposed; yet they are highly popular for messaging applications since they offer new features such as certificateless infrastructure and anonymous communication. In this paper, we intended
Karatop, Ayse Gul+3 more
core +2 more sources
A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based Cryptograph
Cellular vehicle to everything (C-V2X) is a technology to achieve vehicle networking, which can improve traffic efficiency and traffic safety. As a special network, the C-V2X system faces many security risks.
Qiang Li
semanticscholar +1 more source
I2PA : An Efficient ABC for IoT [PDF]
Internet of Things (IoT) is very attractive because of its promises. However, it brings many challenges, mainly issues about privacy preserving and lightweight cryptography.
Ciss, Abdoul Aziz+2 more
core +3 more sources
Pay as You Go: A Generic Crypto Tolling Architecture
The imminent pervasive adoption of vehicular communication, based on dedicated short-range technology (ETSI ITS G5 or IEEE WAVE), 5G, or both, will foster a richer service ecosystem for vehicular applications.
Bartolomeu, Paulo+2 more
core +1 more source
Securing address registration in location/ID split protocol using ID-based cryptography [PDF]
The Locator/ID Separation Protocol (LISP) is a routing architecture that provides new semantics for IP addressing. In order to simplify routing operations and improve scalability in future Internet, the LISP separates the device identity from its ...
Aiash, Mahdi+2 more
core +1 more source
The unpredictably eruptive dynamics of spruce budworm populations in eastern Canada
We examine historical population data for spruce budworm from several locations through the period 1930–1997, and use density‐dependent recruitment curves to test whether the pattern of population growth over time is more consistent with Royama's (1984; Ecological Monographs 54:429–462) linear R(t) model of harmonic oscillation at Green River New ...
Barry J. Cooke, Jacques Régnière
wiley +1 more source
occumb: An R package for site occupancy modeling of eDNA metabarcoding data
This study introduces a new R package, occumb, for the convenient application of site occupancy modeling using environmental DNA (eDNA) metabarcoding data. We outline a data analysis workflow, including data setup, model fitting, model assessment, and comparison of potential study settings based on model predictions, all of which can be performed using
Keiichi Fukaya, Yuta Hasebe
wiley +1 more source