Results 31 to 40 of about 59,119 (273)
AbstractIdentity-based encryption systems are characterized by the fact that the public key is easy to remember, and the step of linking the public key to a specific identity is omitted; the identity (e.g., an e-mail address) is the public key. Applications of Identity-based encryption are still relatively rare, although there are now various standards
openaire +1 more source
Cross-platform Identity-based Cryptography using WebAssembly [PDF]
The explosive spread of the devices connected to the Internet has increased the need for efficient and portable cryptographic routines. Despite this fact, truly platformindependent implementations are still hard to find. In this paper, an Identitybased Cryptography library, called CryptID is introduced.
Vécsi, Ádám +2 more
openaire +2 more sources
Cloud Computing in the Quantum Era [PDF]
Cloud computing has become the prominent technology of this era. Its elasticity, dynamicity, availability, heterogeneity, and pay as you go pricing model has attracted several companies to migrate their businesses' services into the cloud.
Kaiiali, Mustafa +2 more
core +2 more sources
I2PA : An Efficient ABC for IoT [PDF]
Internet of Things (IoT) is very attractive because of its promises. However, it brings many challenges, mainly issues about privacy preserving and lightweight cryptography.
Ciss, Abdoul Aziz +2 more
core +4 more sources
IntroductionDigital identity infrastructures used in electronic passports, national eID schemes, and federated authentication systems rely predominantly on centralised registries and classical public key cryptography.
Petar Radanliev +4 more
doaj +1 more source
Mediated IBC-Based Management System of Identity and Access in Cloud Computing
Cloud computing is a new technology that provide to consumers dramatically scalable and virtualized resources, bandwidth, software and hardware on demand. However, cloud computing introduces serious security problems. One of these major security concerns
Sufyan T. Faraja +2 more
doaj +1 more source
A Survey of Access Control Models in Wireless Sensor Networks [PDF]
Copyright 2014 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/)Wireless sensor ...
Christianson, B. +3 more
core +2 more sources
A STUDY OF BILINEAR MAPS IN WIRELESS SENSOR NETWORKS
In the past, a large part of security requirements of wireless sensor networks (WSN) were fulfilled by symmetric cryptography systems. But, today by introduction of new needs in these networks and their security development, researchers of security and ...
Reza Alimoradi +2 more
doaj +1 more source
Pseudo Identities Based on Fingerprint Characteristics [PDF]
This paper presents the integrated project TURBINE which is funded under the EU 7th research framework programme. This research is a multi-disciplinary effort on privacy enhancing technology, combining innovative developments in cryptography and ...
Akkermans, Ton +19 more
core +3 more sources
Identity-based incremental signature scheme from lattices
By taking ideas of identity-based cryptography into incremental signatures, the concept of identity-based incremental signature was proposed, and then a specific scheme from lattices was also constructed.The scheme was shown to be provably secure against
Miaomiao TIAN, Jing CHEN, Hong ZHONG
doaj +2 more sources

