Results 261 to 270 of about 84,134 (310)
ECACS: An Enhanced Certificateless Authentication Scheme for Smart Car Sharing. [PDF]
Shen Z, Kou X, Yang T.
europepmc +1 more source
Privacy-preserving communication in smart city transportation using elliptic curve cryptography. [PDF]
Mohammed ZK +7 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2021
In this chapter we will discuss public-key cryptography(PKC) and it’s various applications and its probable use. Limitations and disadvantages of symmetric-key cryptography(private-key cryptography) motivates the extensive use of public-key cryptography. Well known limitations are: Key exchange is a major problem in symmetric key cryptography. you
Satyanarayana Vollala +2 more
openaire +1 more source
In this chapter we will discuss public-key cryptography(PKC) and it’s various applications and its probable use. Limitations and disadvantages of symmetric-key cryptography(private-key cryptography) motivates the extensive use of public-key cryptography. Well known limitations are: Key exchange is a major problem in symmetric key cryptography. you
Satyanarayana Vollala +2 more
openaire +1 more source
AT&T Technical Journal, 1994
This article explains public key cryptography, its benefits and limitations.
openaire +1 more source
This article explains public key cryptography, its benefits and limitations.
openaire +1 more source
2005
Secure transmission of private information is a crucial issue in today’s highly computerized world. Cryptographic algorithms are used to provide privacy of message transmission and to certify authenticity of sender and/or receiver of a message and message integrity as well as undeniability of transmitted messages (Menezes et al., 1996).
+6 more sources
Secure transmission of private information is a crucial issue in today’s highly computerized world. Cryptographic algorithms are used to provide privacy of message transmission and to certify authenticity of sender and/or receiver of a message and message integrity as well as undeniability of transmitted messages (Menezes et al., 1996).
+6 more sources
Introduction to Public-Key Cryptography
2005In this chapter we introduce the basic building blocks for cryptography based on the discrete logarithm problem that will constitute the main motivation for considering the groups studied in this book. We also briefly introduce the RSA cryptosystem as for use in practice it is still an important public-key cryptosystem.
Avanzi, R., Lange, T.
openaire +2 more sources
Abstract The basic idea of public-key cryptography as a means for two untrusting parties to establish secure communication is outlined. The use of public-key cryptography to establish a key for a symmetric cryptosystem by using a protocol such as the Diffie-Hellman protocol or quantum key distribution (QKD) is explained. Two major public-
Eric L. F. Roettger, Hugh C. Williams
+4 more sources
Eric L. F. Roettger, Hugh C. Williams
+4 more sources

