Results 41 to 50 of about 835,298 (263)

Agri-Food Traceability Management using a RFID System with Privacy Protection [PDF]

open access: yes, 2007
In this paper an agri-food traceability system based on public key cryptography and Radio Frequency Identification (RFID) technology is proposed. In order to guarantee safety in food, an efficient tracking and tracing system is required.
Bernardi, Paolo   +5 more
core   +2 more sources

Analysis Review on Public Key Cryptography Algorithms

open access: yesIndonesian Journal of Electrical Engineering and Computer Science, 2018
This paper presents several Public Key Cryptography (PKC) algorithms based on the perspective of researchers’ effort since it was invented in the last four decades.
Jasmin Ilyani Ahmad   +2 more
semanticscholar   +1 more source

Transitory Master Key Transport Layer Security for WSNs

open access: yesIEEE Access, 2020
Security approaches in Wireless Sensor Networks (WSNs) are normally based on symmetric cryptography. Instead of symmetric encryption, some alternative approaches have been developed by using public-key cryptography. However, the higher computational cost
Mattia Griotti   +2 more
doaj   +1 more source

Improved Identity Based Encryption System (IIBES): A Mechanism for Eliminating the Key-Escrow Problem

open access: yesEmerging Science Journal, 2021
A revolutionary change to public-key cryptography can be considered as an Identity Based Cryptography (IBC) in which identity of the receiver is being used as a public key for encrypting a message and Key Generation Centre (KGC).
Maitri Patel, Rajan Patel
doaj   +1 more source

07381 Executive Summary - Cryptography [PDF]

open access: yes, 2008
The topics covered in the seminar spanned most areas of cryptography, in one way or another, both in terms of the types of schemes (public-key cryptography, symmetric cryptography, hash functions and other cryptographic functions, multi-party protocols ...
  +3 more
core   +1 more source

Dynamic Cryptography Integrated Secured Decentralized Applications with Blockchain Programming

open access: yesWasit Journal of Computer and Mathematics Science, 2022
Blocks and chains are the building blocks of the blockchain, which is a community network. Blocks and chains are two terms used to describe collections of data information.
Jamal Kh-Madhloom
doaj   +1 more source

Quantum‐resistant anonymous identity‐based encryption with trable identities

open access: yesIET Information Security, 2022
Identity‐based encryption (IBE), introduced by Shamir, eliminates the need for public‐key infrastructure. The sender can simply encrypt a message by using the recipient's identity (such as email or IP address) without needing to look up the public key ...
Zi‐Yuan Liu   +4 more
doaj   +1 more source

Joint Operation in Public Key Cryptography [PDF]

open access: yesInternational Journal of Advanced Computer Science and Applications, 2013
We believe that there is no real data protection without our own tools. Therefore, our permanent aim is to have more of our own codes. In order to achieve that, it is necessary that a lot of young researchers become interested in cryptography. We believe that the encoding of cryptographic algorithms is an important step in that direction, and it is the
Dragan Vidakovic   +3 more
openaire   +3 more sources

Pseudo Random Generator Based Public Key Cryptography [PDF]

open access: yes, 2017
Advances in communication technology have seen strong interest in digital data transmission. However, illegal data access has become more easy and prevalent in wireless and general communication networks.
Bhatia, K. (Kirti), Saini, N. (Neha)
core   +1 more source

A STUDY OF BILINEAR MAPS IN WIRELESS SENSOR NETWORKS

open access: yesICTACT Journal on Communication Technology, 2017
In the past, a large part of security requirements of wireless sensor networks (WSN) were fulfilled by symmetric cryptography systems. But, today by introduction of new needs in these networks and their security development, researchers of security and ...
Reza Alimoradi   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy