Results 261 to 270 of about 59,119 (273)
Some of the next articles are maybe not open access.

Dynamic Identity-Based Cryptography using RSA

2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)
Gopala Krishnan   +5 more
openaire   +1 more source

Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems

IEEE Transactions on Parallel and Distributed Systems, 2009
Kevin R B Butler, Patrick Traynor
exaly  

The advantages of elliptic curve cryptography for wireless security

IEEE Wireless Communications, 2004
Dipak Ghosal
exaly  

Identity-Based Encryption from the Weil Pairing

SIAM Journal on Computing, 2003
Dan Boneh
exaly  

Securing wireless sensor networks: an identity-based cryptography approach

International Journal of Sensor Networks, 2010
Michael Scott, Martin Collier
exaly  

Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

IEEE Transactions on Information Forensics and Security, 2016
Huaqun Wang, De-biao He, Shaohua Tang
exaly  

TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks

Computer Communications, 2011
Diego F Aranha   +2 more
exaly  

Securing Mobile Ad Hoc Networks Using Enhanced Identity-Based Cryptography

ETRI Journal, 2015
Kamal Adli Mehr, Javad Musevi Niya
exaly  

A tapestry of identity-based encryption: practical frameworks compared

International Journal of Applied Cryptography, 2008
exaly  

Home - About - Disclaimer - Privacy