Results 11 to 20 of about 59,119 (273)

Modelling and Simulation of a Biometric Identity-Based Cryptography [PDF]

open access: yesInternational Journal of Advanced Research in Artificial Intelligence, 2014
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tend to be the main ...
Aljeaid, D, Ma, X, Langensiepen, C
openaire   +5 more sources

Security and Privacy Schemes in Vehicular Ad-Hoc Network With Identity-Based Cryptography Approach: A Survey

open access: yesIEEE Access, 2021
Vehicular Ad hoc Networks (VANET) broadcast messages regarding road and environmental conditions. Due to its design, VANET inadvertently introduced security and privacy issues.
Mahmood A. Al-Shareeda   +4 more
doaj   +3 more sources

Identity based cryptography from bilinear pairings [PDF]

open access: yes, 2005
This report contains an overview of two related areas of research in cryptography which have been prolific in significant advances in recent years. The first of these areas is pairing based cryptography. Bilinear pairings over elliptic curves were initially used as formal mathematical tools and later as cryptanalysis tools that rendered supersingular ...
Barbosa, Manuel
openaire   +3 more sources

Two Efficient Constructions for Biometric-Based Signature in Identity-Based Setting Using Bilinear Pairings

open access: yesIEEE Access, 2021
It is always an attractive topic for researchers that biometric traits are used to represent the identities of users in identity-based cryptography due to their unique and inherent properties.
Xiwei Shan, Lin You, Gengran Hu
doaj   +1 more source

Identity-Based Cryptography for Grid Security [PDF]

open access: yesFirst International Conference on e-Science and Grid Computing (e-Science'05), 2006
The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure resource allocation to these members. Identity-based cryptography (IBC) has some attractive properties which seem to align well with the demands of grid computing.
Hoon Wei Lim, Kenneth G. Paterson
openaire   +1 more source

A Comprehensive Survey on Certificate-Less Authentication Schemes for Vehicular Ad hoc Networks in Intelligent Transportation Systems

open access: yesSensors, 2023
Data transmission in intelligent transportation systems is being challenged by a variety of factors, such as open wireless communication channels, that pose problems related to security, anonymity, and privacy.
Santhosh Kumar Sripathi Venkata Naga   +3 more
doaj   +1 more source

A PKC-based security architecture for WSN [PDF]

open access: yesMATEC Web of Conferences, 2020
It is an important challenge to find out suitable cryptography for WSN due to limitations of energy, computation capability and storage resources. Considering this sensor feature on limitations of resources, a security architecture based-on public key ...
Yao Jianbo, Yang Chaoqiong
doaj   +1 more source

INTEGRATED CRYPTOGRAPHICAL ACCESS CONTROL OVER NETWORK PROJECT [PDF]

open access: yesActa Informatica Malaysia, 2020
Cryptanalysis is a new ID-based encryption scheme proposed by Meshram. I found a method for factor N, where N is the parameter proposed by Meshram. We also provide a method for retrieving the Secret Master key for Mayshram’s ID-based encryption scheme ...
Yakubu Ajiji Makeri
doaj   +1 more source

Home - About - Disclaimer - Privacy