Results 31 to 40 of about 58,711 (310)

Cloud Computing Security with Identity-Based Authentication Using Heritage-Based Technique [PDF]

open access: yes, 2017
More organizations start to give various types of distributed computing administrations for Internet clients in the meantime these administrations additionally bring some security issues.
Kapoor, R. K. (R), Sharma, R. K. (Rishi)
core   +1 more source

Efficient and Anonymous Certificateless Multi-Message and Multi-Receiver Signcryption Scheme Based on ECC

open access: yesIEEE Access, 2019
As the further extension of the multi-receiver signcryption, the multi-message and multi-receiver signcryption allows a sender to simultaneously signcrypt different messages for different receivers in only one logic operation, which makes it more ...
Liaojun Pang, Mengmeng Wei, Huixian Li
doaj   +1 more source

Cloud Computing in the Quantum Era [PDF]

open access: yes, 2019
Cloud computing has become the prominent technology of this era. Its elasticity, dynamicity, availability, heterogeneity, and pay as you go pricing model has attracted several companies to migrate their businesses' services into the cloud.
Kaiiali, Mustafa   +2 more
core   +2 more sources

Identity-Based Cryptography

open access: yes, 2023
AbstractIdentity-based encryption systems are characterized by the fact that the public key is easy to remember, and the step of linking the public key to a specific identity is omitted; the identity (e.g., an e-mail address) is the public key. Applications of Identity-based encryption are still relatively rare, although there are now various standards
openaire   +1 more source

Pay as You Go: A Generic Crypto Tolling Architecture

open access: yes, 2020
The imminent pervasive adoption of vehicular communication, based on dedicated short-range technology (ETSI ITS G5 or IEEE WAVE), 5G, or both, will foster a richer service ecosystem for vehicular applications.
Bartolomeu, Paulo   +2 more
core   +1 more source

Securing address registration in location/ID split protocol using ID-based cryptography [PDF]

open access: yes, 2013
The Locator/ID Separation Protocol (LISP) is a routing architecture that provides new semantics for IP addressing. In order to simplify routing operations and improve scalability in future Internet, the LISP separates the device identity from its ...
Aiash, Mahdi   +2 more
core   +1 more source

An identity-based key infrastructure suitable for messaging applications [PDF]

open access: yes, 2007
—Identity-based encryption (IBE) systems are relatively recently proposed; yet they are highly popular for messaging applications since they offer new features such as certificateless infrastructure and anonymous communication. In this paper, we intended
Karatop, Ayse Gul   +3 more
core   +2 more sources

Mediated IBC-Based Management System of Identity and Access in Cloud Computing

open access: yesTikrit Journal of Engineering Sciences, 2013
Cloud computing is a new technology that provide to consumers dramatically scalable and virtualized resources, bandwidth, software and hardware on demand. However, cloud computing introduces serious security problems. One of these major security concerns
Sufyan T. Faraja   +2 more
doaj   +1 more source

Complying with the NIST post-quantum cryptography standards and decentralizing artificial intelligence: methodology for quantum-resistant and privacy-preserving digital identity systems

open access: yesFrontiers in Blockchain
IntroductionDigital identity infrastructures used in electronic passports, national eID schemes, and federated authentication systems rely predominantly on centralised registries and classical public key cryptography.
Petar Radanliev   +4 more
doaj   +1 more source

A STUDY OF BILINEAR MAPS IN WIRELESS SENSOR NETWORKS

open access: yesICTACT Journal on Communication Technology, 2017
In the past, a large part of security requirements of wireless sensor networks (WSN) were fulfilled by symmetric cryptography systems. But, today by introduction of new needs in these networks and their security development, researchers of security and ...
Reza Alimoradi   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy