Results 21 to 30 of about 10,103,841 (323)
Service for Verification of Electronic Document’s Certificates
The legislation of the Republic of Belarus currently establishes the same legal force for identical documents on paper and in electronic form, which have a mandatory requisite - an electronic digital signature.
I. O. Tolokh +2 more
doaj +1 more source
A Secure Mobile Banking Using Kerberos Protocol [PDF]
Because the network is an open environment, a lot of care must be taken whentransferring sensitive information especially when related with financial data.
Mohammad N. Abdullah, May T. Abdul-Hadi
doaj +1 more source
Matrično zasnovan algoritam za skrivanje tekstova i obradu informacija
Primena diferencijalne geometrije u skrivanju tekstualnih podataka prikazana je u ovom radu. Ta primena predstavlja generalizaciju prethodno predstavljenih metoda. Matrično vrednosne funkcije više promenljivih korišćene su u ovom radu.
Nenad O. Vesić, Dušan J. Simjanović
doaj +1 more source
Circulant Rainbow: A New Rainbow Variant With Shorter Private Key and Faster Signature Generation
Rainbow is one of the most important signature schemes in multivariate public key cryptography. It enjoys a strong security guarantee and is a promising signature scheme in Post-Quantum Cryptography. However, it suffers from large key size. In this paper,
Zhiniang Peng, Shaohua Tang
openalex +2 more sources
A distributed key establishment scheme for wireless mesh networks using identity-based cryptography [PDF]
In this paper, we propose a secure and efficient key establishment scheme designed with respect to the unique requirements of Wireless Mesh Networks. Our security model is based on Identity-based key establishment scheme without the utilization of a ...
Karaoglan, Duygu +4 more
core +1 more source
Practical private database queries based on a quantum key distribution protocol [PDF]
Private queries allow a user Alice to learn an element of a database held by a provider Bob without revealing which element she was interested in, while limiting her information about the other elements. We propose to implement private queries based on a
A. Jakoby +17 more
core +4 more sources
Cryptography system gives security services ability to protect information from people who are authorized to use it. This research introduces elevated information security system via hybrid of new expand Rivest Shamir Adleman (RSA) and data encryption ...
M. B. Hammawa +2 more
doaj +1 more source
Secure key from bound entanglement [PDF]
We characterize the set of shared quantum states which contain a cryptographically private key. This allows us to recast the theory of privacy as a paradigm closely related to that used in entanglement manipulation.
Horodecki, Karol +3 more
core +2 more sources
Data Integrity Auditing without Private Key Storage for Secure Cloud Storage
Using cloud storage services, users can store their data in the cloud to avoid the expenditure of local data storage and maintenance. To ensure the integrity of the data stored in the cloud, many data integrity auditing schemes have been proposed.
Wenting Shen +5 more
semanticscholar +1 more source
A hybrid cryptosystem for cloud security: combining Okamoto-Uchiyama and Advanced Encryption Standard for optimized encryption performance [PDF]
The central challenge in cloud computing is delivering strong data protection while maintaining high system performance. This paper addresses the problem by developing a hybrid cryptosystem that integrates the strengths of Okamoto-Uchiyama (OU) and ...
Azhar Malik
doaj +1 more source

