Results 11 to 20 of about 59,119 (273)
Integrating Identity-Based Cryptography In Ims Service Authentication
13Pages
Abid, Mohamed +3 more
openaire +8 more sources
Modelling and Simulation of a Biometric Identity-Based Cryptography [PDF]
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tend to be the main ...
Aljeaid, D, Ma, X, Langensiepen, C
openaire +5 more sources
Vehicular Ad hoc Networks (VANET) broadcast messages regarding road and environmental conditions. Due to its design, VANET inadvertently introduced security and privacy issues.
Mahmood A. Al-Shareeda +4 more
doaj +3 more sources
Data Sharing Mechanism of Sensors and Actuators of Industrial IoT Based on Blockchain-Assisted Identity-Based Cryptography. [PDF]
Meng Y, Li J.
europepmc +2 more sources
Identity based cryptography from bilinear pairings [PDF]
This report contains an overview of two related areas of research in cryptography which have been prolific in significant advances in recent years. The first of these areas is pairing based cryptography. Bilinear pairings over elliptic curves were initially used as formal mathematical tools and later as cryptanalysis tools that rendered supersingular ...
Barbosa, Manuel
openaire +3 more sources
It is always an attractive topic for researchers that biometric traits are used to represent the identities of users in identity-based cryptography due to their unique and inherent properties.
Xiwei Shan, Lin You, Gengran Hu
doaj +1 more source
Identity-Based Cryptography for Grid Security [PDF]
The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure resource allocation to these members. Identity-based cryptography (IBC) has some attractive properties which seem to align well with the demands of grid computing.
Hoon Wei Lim, Kenneth G. Paterson
openaire +1 more source
Data transmission in intelligent transportation systems is being challenged by a variety of factors, such as open wireless communication channels, that pose problems related to security, anonymity, and privacy.
Santhosh Kumar Sripathi Venkata Naga +3 more
doaj +1 more source
A PKC-based security architecture for WSN [PDF]
It is an important challenge to find out suitable cryptography for WSN due to limitations of energy, computation capability and storage resources. Considering this sensor feature on limitations of resources, a security architecture based-on public key ...
Yao Jianbo, Yang Chaoqiong
doaj +1 more source
INTEGRATED CRYPTOGRAPHICAL ACCESS CONTROL OVER NETWORK PROJECT [PDF]
Cryptanalysis is a new ID-based encryption scheme proposed by Meshram. I found a method for factor N, where N is the parameter proposed by Meshram. We also provide a method for retrieving the Secret Master key for Mayshram’s ID-based encryption scheme ...
Yakubu Ajiji Makeri
doaj +1 more source

