Results 211 to 220 of about 3,565 (253)
Provably lightweight and secure IoHT scheme with post-quantum cryptography and fog computing: A comprehensive scheme for healthcare system. [PDF]
Abood EW +4 more
europepmc +1 more source
Expressive Attribute-Based Proxy Signature Scheme for UAV Networks. [PDF]
He L, Gan Y, Jin S.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Post Quantum Public and Private Key Cryptography Optimized for IoT Security
Wireless Personal Communications, 2022The number of Internet of Things devices is growing exponentially with the introduction of 5G. They are incorporated into a wide spectrum of devices ranging from our mobile phones to healthcare tracking devices. With the advent of 5G and quantum computers, traditional cryptography algorithms will be deprecated and will be prone to quantum attacks by ...
Ajay Kaushik +8 more
openaire +2 more sources
Public and Private Key Cryptography
2021Please download the sample Excel files from https://github.com/hhohho/master-Excel-through-projects for this chapter’s exercises.
openaire +1 more source
Private key and public key quantum cryptography
Summaries of Papers Presented at the Quantum Electronics and Laser Science Conference, 2003Summary form only given. Information has always been valuable, never more so than in recent decades, and throughout history people have turned to cryptography in an attempt to keep important information secret. Coherent manipulation of quantum states promises to rearrange the lists of possible and impossible cryptographic tasks.
openaire +1 more source
Accelerating private-key cryptography via multithreading on symmetric multiprocessors
2003 IEEE International Symposium on Performance Analysis of Systems and Software. ISPASS 2003., 2003Achieving high performance in cryptographic processing is important due to the increasing connectivity among today's computers. Despite steady improvements in microprocessor and system performance, private-key cipher implementations continue to be slow.
P. Dongara, T.N. Vijaykumar
openaire +1 more source
Forward-Security in Private-Key Cryptography
2003This paper provides a comprehensive treatment of forwardsecurity in the context of shared-key based cryptographic primitives, as a practical means to mitigate the damage caused by key-exposure. We provide definitions of security, practical proven-secure constructions, and applications for the main primitives in this area.
Mihir Bellare, Bennet Yee
openaire +1 more source
2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE), 2013
Virtual Private Networks have been efficient tools that provide inter-connectivity to exchange information between different (remote) parties that belong to a specific network. A virtual private network possesses all the features of the private networks and are built upon existing network, but they suffer severe security problems, particularly, the ...
Abeer Eldewahi, Eihab Basheir
openaire +1 more source
Virtual Private Networks have been efficient tools that provide inter-connectivity to exchange information between different (remote) parties that belong to a specific network. A virtual private network possesses all the features of the private networks and are built upon existing network, but they suffer severe security problems, particularly, the ...
Abeer Eldewahi, Eihab Basheir
openaire +1 more source
Distributed Private-Key Generators for Identity-Based Cryptography
2010An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages. However, an IBE scheme necessarily requires a private-key generator (PKG), which can create private keys for clients, and so can passively eavesdrop on all encrypted communications.
Aniket Kate, Ian Goldberg
openaire +1 more source

