Results 31 to 40 of about 59,119 (273)

Identity-Based Cryptography

open access: yes, 2023
AbstractIdentity-based encryption systems are characterized by the fact that the public key is easy to remember, and the step of linking the public key to a specific identity is omitted; the identity (e.g., an e-mail address) is the public key. Applications of Identity-based encryption are still relatively rare, although there are now various standards
openaire   +1 more source

Cross-platform Identity-based Cryptography using WebAssembly [PDF]

open access: yesInfocommunications journal, 2019
The explosive spread of the devices connected to the Internet has increased the need for efficient and portable cryptographic routines. Despite this fact, truly platformindependent implementations are still hard to find. In this paper, an Identitybased Cryptography library, called CryptID is introduced.
Vécsi, Ádám   +2 more
openaire   +2 more sources

Cloud Computing in the Quantum Era [PDF]

open access: yes, 2019
Cloud computing has become the prominent technology of this era. Its elasticity, dynamicity, availability, heterogeneity, and pay as you go pricing model has attracted several companies to migrate their businesses' services into the cloud.
Kaiiali, Mustafa   +2 more
core   +2 more sources

I2PA : An Efficient ABC for IoT [PDF]

open access: yes, 2019
Internet of Things (IoT) is very attractive because of its promises. However, it brings many challenges, mainly issues about privacy preserving and lightweight cryptography.
Ciss, Abdoul Aziz   +2 more
core   +4 more sources

Complying with the NIST post-quantum cryptography standards and decentralizing artificial intelligence: methodology for quantum-resistant and privacy-preserving digital identity systems

open access: yesFrontiers in Blockchain
IntroductionDigital identity infrastructures used in electronic passports, national eID schemes, and federated authentication systems rely predominantly on centralised registries and classical public key cryptography.
Petar Radanliev   +4 more
doaj   +1 more source

Mediated IBC-Based Management System of Identity and Access in Cloud Computing

open access: yesTikrit Journal of Engineering Sciences, 2013
Cloud computing is a new technology that provide to consumers dramatically scalable and virtualized resources, bandwidth, software and hardware on demand. However, cloud computing introduces serious security problems. One of these major security concerns
Sufyan T. Faraja   +2 more
doaj   +1 more source

A Survey of Access Control Models in Wireless Sensor Networks [PDF]

open access: yes, 2014
Copyright 2014 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/)Wireless sensor ...
Christianson, B.   +3 more
core   +2 more sources

A STUDY OF BILINEAR MAPS IN WIRELESS SENSOR NETWORKS

open access: yesICTACT Journal on Communication Technology, 2017
In the past, a large part of security requirements of wireless sensor networks (WSN) were fulfilled by symmetric cryptography systems. But, today by introduction of new needs in these networks and their security development, researchers of security and ...
Reza Alimoradi   +2 more
doaj   +1 more source

Pseudo Identities Based on Fingerprint Characteristics [PDF]

open access: yes, 2008
This paper presents the integrated project TURBINE which is funded under the EU 7th research framework programme. This research is a multi-disciplinary effort on privacy enhancing technology, combining innovative developments in cryptography and ...
Akkermans, Ton   +19 more
core   +3 more sources

Identity-based incremental signature scheme from lattices

open access: yesTongxin xuebao, 2021
By taking ideas of identity-based cryptography into incremental signatures, the concept of identity-based incremental signature was proposed, and then a specific scheme from lattices was also constructed.The scheme was shown to be provably secure against
Miaomiao TIAN, Jing CHEN, Hong ZHONG
doaj   +2 more sources

Home - About - Disclaimer - Privacy