Results 41 to 50 of about 461,214 (305)

A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based Cryptograph

open access: yesFuture Internet, 2023
Cellular vehicle to everything (C-V2X) is a technology to achieve vehicle networking, which can improve traffic efficiency and traffic safety. As a special network, the C-V2X system faces many security risks.
Qiang Li
semanticscholar   +1 more source

I2PA : An Efficient ABC for IoT [PDF]

open access: yes, 2019
Internet of Things (IoT) is very attractive because of its promises. However, it brings many challenges, mainly issues about privacy preserving and lightweight cryptography.
Ciss, Abdoul Aziz   +2 more
core   +4 more sources

Complying with the NIST post-quantum cryptography standards and decentralizing artificial intelligence: methodology for quantum-resistant and privacy-preserving digital identity systems

open access: yesFrontiers in Blockchain
IntroductionDigital identity infrastructures used in electronic passports, national eID schemes, and federated authentication systems rely predominantly on centralised registries and classical public key cryptography.
Petar Radanliev   +4 more
doaj   +1 more source

Mediated IBC-Based Management System of Identity and Access in Cloud Computing

open access: yesTikrit Journal of Engineering Sciences, 2013
Cloud computing is a new technology that provide to consumers dramatically scalable and virtualized resources, bandwidth, software and hardware on demand. However, cloud computing introduces serious security problems. One of these major security concerns
Sufyan T. Faraja   +2 more
doaj   +1 more source

A Survey of Access Control Models in Wireless Sensor Networks [PDF]

open access: yes, 2014
Copyright 2014 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/)Wireless sensor ...
Christianson, B.   +3 more
core   +2 more sources

A STUDY OF BILINEAR MAPS IN WIRELESS SENSOR NETWORKS

open access: yesICTACT Journal on Communication Technology, 2017
In the past, a large part of security requirements of wireless sensor networks (WSN) were fulfilled by symmetric cryptography systems. But, today by introduction of new needs in these networks and their security development, researchers of security and ...
Reza Alimoradi   +2 more
doaj   +1 more source

A Review on Identity based Cryptography

open access: yesInternational Journal of Computer Applications, 2015
Security in mobile ad-hoc networks (MANET’s) continues to draw in attention when years of analysis. Recent advances in identity-based cryptography (IBC) sheds light-weight on this drawback and has become widespread as an answer base. In this research it is presenting a comprehensive image and capture the state of the art of IBC security applications in
Heena Heena, Sonia Thakur
openaire   +1 more source

Pseudo Identities Based on Fingerprint Characteristics [PDF]

open access: yes, 2008
This paper presents the integrated project TURBINE which is funded under the EU 7th research framework programme. This research is a multi-disciplinary effort on privacy enhancing technology, combining innovative developments in cryptography and ...
Akkermans, Ton   +19 more
core   +3 more sources

Identity-based incremental signature scheme from lattices

open access: yesTongxin xuebao, 2021
By taking ideas of identity-based cryptography into incremental signatures, the concept of identity-based incremental signature was proposed, and then a specific scheme from lattices was also constructed.The scheme was shown to be provably secure against
Miaomiao TIAN, Jing CHEN, Hong ZHONG
doaj   +2 more sources

An Efficient Heterogeneous Signcryption Scheme from Certificateless to Identity-based Cryptosystem

open access: yesMATEC Web of Conferences, 2017
The heterogeneous signcryption can not only realize the confidentiality and un-forgeability of the information transmission between different public key cryptography environments, but also reduce the communication cost. The proposed scheme uses bilin-ear
Niu Shufen   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy