Results 251 to 260 of about 16,729,036 (330)
Some of the next articles are maybe not open access.
Public key authenticated encryption with keyword search: revisited
IET Information Security, 2019In 2017, the notion of public key authenticated encryption with keyword search (PAEKS) and its security model was defined by Huang and Li. Their main motivation was providing security against inside keyword guessing attacks (KGA).
Mahnaz Noroozi, Ziba Eslami
semanticscholar +1 more source
Quantum Public-Key Cryptosystem
International Journal of Theoretical Physics, 2011zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Luo, Ming-Xing +3 more
openaire +1 more source
IEEE Transactions on Industrial Informatics, 2018
Industrial Internet of Things (IIoT) integrates various types of intelligent terminals, mobile devices, and communication technologies to enable the upgrade of traditional industries to intelligent industries.
De-biao He +4 more
semanticscholar +1 more source
Industrial Internet of Things (IIoT) integrates various types of intelligent terminals, mobile devices, and communication technologies to enable the upgrade of traditional industries to intelligent industries.
De-biao He +4 more
semanticscholar +1 more source
AT&T Technical Journal, 1994
This article explains public key cryptography, its benefits and limitations.
openaire +1 more source
This article explains public key cryptography, its benefits and limitations.
openaire +1 more source
On Splitting Public Keys for the Public Key Infrastructure
2005 IEEE International Conference on e-Technology, e-Commerce and e-Service, 2005Certificates and the public key infrastructure (PKI) play an vital role in electronic commerce. The framework of splitting the public key in the PKI is presented in this paper. Aimed to enhance the security level from both the perspectives of certificate issuing and certificate revocation, the framework splits the public key into multiple parts, and ...
S. Cristiano, F.F. Liu
openaire +1 more source
Coalition Public-Key Cryptosystems
Cybernetics and Systems Analysis, 2001A coalition is understood to be a group of participants (coalitionists) who can collaborate in order to achieve common objectives. The basic principle of a coalition is the absence of a threat to communication flows within the coalition from its participants. In this paper, two new RSA coalition protocols are considered. According to the first protocol,
openaire +1 more source
1999
Public-key algorithms use a secret element and a public element to their code. One of the main algorithms is RSA. Compared with DES it is relatively slow but it has the advantage that users can choose their own key whenever they need one. The most commonly used public-key cryptosystems are covered in the next sections.
openaire +1 more source
Public-key algorithms use a secret element and a public element to their code. One of the main algorithms is RSA. Compared with DES it is relatively slow but it has the advantage that users can choose their own key whenever they need one. The most commonly used public-key cryptosystems are covered in the next sections.
openaire +1 more source
2021
In this chapter we will discuss public-key cryptography(PKC) and it’s various applications and its probable use. Limitations and disadvantages of symmetric-key cryptography(private-key cryptography) motivates the extensive use of public-key cryptography. Well known limitations are: Key exchange is a major problem in symmetric key cryptography. you
Satyanarayana Vollala +2 more
openaire +1 more source
In this chapter we will discuss public-key cryptography(PKC) and it’s various applications and its probable use. Limitations and disadvantages of symmetric-key cryptography(private-key cryptography) motivates the extensive use of public-key cryptography. Well known limitations are: Key exchange is a major problem in symmetric key cryptography. you
Satyanarayana Vollala +2 more
openaire +1 more source
Public key versus symmetric key cryptography in client–server authentication protocols
International Journal of Information Security, 2021An Braeken
semanticscholar +1 more source
Abstract The basic idea of public-key cryptography as a means for two untrusting parties to establish secure communication is outlined. The use of public-key cryptography to establish a key for a symmetric cryptosystem by using a protocol such as the Diffie-Hellman protocol or quantum key distribution (QKD) is explained. Two major public-
Eric L. F. Roettger, Hugh C. Williams
openaire +2 more sources
Eric L. F. Roettger, Hugh C. Williams
openaire +2 more sources

