Results 21 to 30 of about 59,119 (273)

Efficient Unified Arithmetic for Hardware Cryptography [PDF]

open access: yes, 2008
The basic arithmetic operations (i.e. addition, multiplication, and inversion) in finite fields, GF(q), where q = pk and p is a prime integer, have several applications in cryptography, such as RSA algorithm, Diffie-Hellman key exchange algorithm [1 ...
Koc, Cetin Kaya   +3 more
core   +2 more sources

Biometric identity-based cryptography for e-Government environment [PDF]

open access: yes, 2014
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks.
Aljeaid, D, Langensiepen, C, Ma, X
core   +1 more source

Cloud Computing Security with Identity-Based Authentication Using Heritage-Based Technique [PDF]

open access: yes, 2017
More organizations start to give various types of distributed computing administrations for Internet clients in the meantime these administrations additionally bring some security issues.
Kapoor, R. K. (R), Sharma, R. K. (Rishi)
core   +1 more source

An Improved Identity-Based Multivariate Signature Scheme Based on Rainbow

open access: yesCryptography, 2019
Multivariate Public Key Cryptography (MPKC) is one of the main candidates for post-quantum cryptography, especially in the area of signature schemes. In this paper, we instantiate a certificate Identity-Based Signature (IBS) scheme based on Rainbow, one ...
Le Van Luyen
doaj   +1 more source

A distributed key establishment scheme for wireless mesh networks using identity-based cryptography [PDF]

open access: yes, 2010
In this paper, we propose a secure and efficient key establishment scheme designed with respect to the unique requirements of Wireless Mesh Networks. Our security model is based on Identity-based key establishment scheme without the utilization of a ...
Karaoglan, Duygu   +4 more
core   +1 more source

PRESTvO: PRivacy Enabled Smartphone Based Access to Vehicle On-Board Units

open access: yesIEEE Access, 2020
Smartphones are quickly moving toward complementing or even replacing traditional car keys. We advocate a role-based access control policy mixed with attributes that facilitates access to various functionalities of vehicular on-board units from ...
Bogdan Groza   +4 more
doaj   +1 more source

Multidomain Network Based on Programmable Networks: Security Architecture [PDF]

open access: yes, 2005
This paper proposes a generic security architecture designed for a multidomain and multiservice network based on programmable networks. The multiservice network allows users of an IP network to run programmable services using programmable nodes ...
Alarcos, Bernardo   +2 more
core   +2 more sources

Pay as You Go: A Generic Crypto Tolling Architecture

open access: yes, 2020
The imminent pervasive adoption of vehicular communication, based on dedicated short-range technology (ETSI ITS G5 or IEEE WAVE), 5G, or both, will foster a richer service ecosystem for vehicular applications.
Bartolomeu, Paulo   +2 more
core   +1 more source

A concrete certificateless signature scheme without pairings [PDF]

open access: yes, 2009
Certificateless public key cryptography was introduced to avoid the inherent key escrow problem in identity-based cryptography, and eliminate the use of certificates in traditional PKI. Most cryptographic schemes in certificateless cryptography are built
Chen, Shaozhen, Ge, Aijun, Huang, Xinyi
core   +2 more sources

Efficient and Anonymous Certificateless Multi-Message and Multi-Receiver Signcryption Scheme Based on ECC

open access: yesIEEE Access, 2019
As the further extension of the multi-receiver signcryption, the multi-message and multi-receiver signcryption allows a sender to simultaneously signcrypt different messages for different receivers in only one logic operation, which makes it more ...
Liaojun Pang, Mengmeng Wei, Huixian Li
doaj   +1 more source

Home - About - Disclaimer - Privacy