Results 281 to 290 of about 535,713 (347)
Some of the next articles are maybe not open access.
2005
Secure transmission of private information is a crucial issue in today’s highly computerized world. Cryptographic algorithms are used to provide privacy of message transmission and to certify authenticity of sender and/or receiver of a message and message integrity as well as undeniability of transmitted messages (Menezes et al., 1996).
+7 more sources
Secure transmission of private information is a crucial issue in today’s highly computerized world. Cryptographic algorithms are used to provide privacy of message transmission and to certify authenticity of sender and/or receiver of a message and message integrity as well as undeniability of transmitted messages (Menezes et al., 1996).
+7 more sources
Session-Key Establishment and Authentication in a Smart Home Network Using Public Key Cryptography
IEEE Sensors Letters, 2019The development of the applications of Internet of Things (IoT) technology continues to grow steadily—one of the top applications being smart home environments.
Shreya Dey, A. Hossain
semanticscholar +1 more source
IEEE Transactions on Emerging Topics in Computing, 2023
Advances in quantum computing have brought the need for developing public-key cryptosystems secure against attacks potentially enabled by quantum computers.
Alvaro Cintas Canto +4 more
semanticscholar +1 more source
Advances in quantum computing have brought the need for developing public-key cryptosystems secure against attacks potentially enabled by quantum computers.
Alvaro Cintas Canto +4 more
semanticscholar +1 more source
Abstract The basic idea of public-key cryptography as a means for two untrusting parties to establish secure communication is outlined. The use of public-key cryptography to establish a key for a symmetric cryptosystem by using a protocol such as the Diffie-Hellman protocol or quantum key distribution (QKD) is explained. Two major public-
Eric L. F. Roettger, Hugh C. Williams
+4 more sources
Eric L. F. Roettger, Hugh C. Williams
+4 more sources
AT&T Technical Journal, 1994
This article explains public key cryptography, its benefits and limitations.
openaire +1 more source
This article explains public key cryptography, its benefits and limitations.
openaire +1 more source
A Survey on Post-Quantum Public-Key Signature Schemes for Secure Vehicular Communications
IEEE transactions on intelligent transportation systems (Print), 2022Basic security requirements such as confidentiality, user authentication and data integrity, are assured by using public-key cryptography (PKC). In particular, public-key signature schemes provide non-repudiation, integrity of transmitted messages and ...
Kyung-Ah Shim
semanticscholar +1 more source
Survey on Issues and Recent Advances in Vehicular Public-Key Infrastructure (VPKI)
IEEE Communications Surveys and Tutorials, 2022Public-key infrastructure (PKI) provides the essential foundation for public-key cryptography, and security is often bootstrapped from a PKI. Standardization bodies, organizations, researchers, and experts reached a consensus that deploying Vehicular PKI
Salabat Khan +5 more
semanticscholar +1 more source
2009
This chapter contains sections titled: Introduction This chapter contains sections titled: Cryptosystems and Cryptanalysis Key Management Digital Signatures and Hash Functions Examples of Public Key Systems and Hash Functions Implementations of Public Key Cryptography A Sample Proposal for a LAN ...
openaire +2 more sources
This chapter contains sections titled: Introduction This chapter contains sections titled: Cryptosystems and Cryptanalysis Key Management Digital Signatures and Hash Functions Examples of Public Key Systems and Hash Functions Implementations of Public Key Cryptography A Sample Proposal for a LAN ...
openaire +2 more sources
2003
Part I: Theory Provable security is an important goal in the design of public-key cryptosystems. For most security properties, it is computational security that has to be considered: an attack scenario describes how adversaries interact with the cryptosystem, trying to attack it; the system can be called secure if adversaries with reasonably bounded ...
openaire +2 more sources
Part I: Theory Provable security is an important goal in the design of public-key cryptosystems. For most security properties, it is computational security that has to be considered: an attack scenario describes how adversaries interact with the cryptosystem, trying to attack it; the system can be called secure if adversaries with reasonably bounded ...
openaire +2 more sources
Public key versus symmetric key cryptography in client–server authentication protocols
International Journal of Information Security, 2021An Braeken
semanticscholar +1 more source

