Results 261 to 270 of about 59,119 (273)
Some of the next articles are maybe not open access.
Dynamic Identity-Based Cryptography using RSA
2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)Gopala Krishnan +5 more
openaire +1 more source
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems
IEEE Transactions on Parallel and Distributed Systems, 2009Kevin R B Butler, Patrick Traynor
exaly
The advantages of elliptic curve cryptography for wireless security
IEEE Wireless Communications, 2004Dipak Ghosal
exaly
Securing wireless sensor networks: an identity-based cryptography approach
International Journal of Sensor Networks, 2010Michael Scott, Martin Collier
exaly
A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks
IEEE Communications Surveys and Tutorials, 2012exaly
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
IEEE Transactions on Information Forensics and Security, 2016Huaqun Wang, De-biao He, Shaohua Tang
exaly
Securing Mobile Ad Hoc Networks Using Enhanced Identity-Based Cryptography
ETRI Journal, 2015Kamal Adli Mehr, Javad Musevi Niya
exaly
A tapestry of identity-based encryption: practical frameworks compared
International Journal of Applied Cryptography, 2008exaly

