Results 231 to 240 of about 59,119 (273)
Some of the next articles are maybe not open access.

Identity Based Cryptography

Indian Journal of Computer Science, 2017
Data security is one of the principle concerns today. Digital signature assumes an important part to guarantee authentication, non-integrity, and non-repudiation on a message. Digital signature can be computed using Rives, Shamir, and Adleman (RSA), and elliptic curve cryptography.
Sarvesh Tanwar, Anil Kumar
openaire   +1 more source

E-passport EAC scheme based on Identity-Based Cryptography

Information Processing Letters, 2010
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Li, C. H.   +3 more
openaire   +1 more source

Identity-Based Cryptography

2013
Since computer systems and communication become each time more pervasive, information security takes attention, requiring guarantees for data authentication, integrity and confidentiality. Pervasive communication and computer systems intend to provide access to information and services anytime and anywhere, demanding cryptographic systems more ...
Jenny Torres   +2 more
openaire   +1 more source

Identity-Based Cryptography in Credit Card Payments

2014
In this paper we describe how to apply identity based cryptography to credit card payments. This would help with reducing the possibility of credit card fraud that is prevalent on the Internet. Our method is founded on the identity-based cryptography and it secures the credit card transactions in such a way that many types of credit card fraud become ...
Sailio Mirko, Halunen Kimmo
openaire   +2 more sources

Identity-Based Cryptography

2012
This chapter is devoted to giving a brief introduction to identity-based cryptography (IBC), which presents a nice solution for some problems that limit the wide deployment of public-key cryptography, in particular, the problem of binding public keys with user identities.
openaire   +2 more sources

Identity-Based Signcryption from Identity-Based Cryptography

2012
A signcryption scheme encrypts and signs data in a single operation which is more efficient than using an encryption scheme combined with a signature scheme. Identity-based cryptography (IBC) does not require users to pre-compute key pairs and obtain certificates for their public keys.
Woomyo Lee, Jae Woo Seo, Pil Joong Lee
openaire   +1 more source

Electronic Voting Using Identity Based Cryptography

2010 Fourth International Conference on Digital Society, 2010
Today voting processes are the most important element of democracy as the society´s way to make decisions. Such processes have been influenced by information technologies until becoming be named electronic voting. This topic has been an active research area, on which, cryptographic primitives are used in order to propose secure protocols.
Gina Gallegos-Garcia   +2 more
openaire   +1 more source

ZigBee Security Using Identity-Based Cryptography

2007
ZigBee is a specification defining a set of protocols and architecture for monitoring and control networks. With the advantages of high availability, low cost and low power consumption, ZigBee is ideal for both residential and industrial settings. This paper proposes an application of identity-based cryptography for security in ZigBee networks.
Son Thanh Nguyen, Chunming Rong
openaire   +1 more source

Improving WTLS Protocol Using Identity-Based Cryptography

2012 International Conference on Management of e-Commerce and e-Government, 2012
IBC is emerging as an important contender to traditional public key cryptography for its attractive properties. But the Wireless Transport Layer Security (WTLS) protocol does not support it at present. To resolve this problem, an improved WTLS protocol based on IBC (IB_WTLS) is proposed.
Dai-Rong Yu   +3 more
openaire   +1 more source

RFID System Security Using Identity-Based Cryptography

2010 Third International Symposium on Intelligent Information Technology and Security Informatics, 2010
Two-way authentication is one of the key solutions to improve the security of RFID Tag/Reader due to many attacks on HB, HB+ and HB++. In this paper, we analysis HB, HB+ and HB++ and propose a modified protocol, a two-way authentication to avoid the attacks.
Youqin Chen, Zhide Chen, Li Xu
openaire   +1 more source

Home - About - Disclaimer - Privacy