Results 11 to 20 of about 1,300,731 (292)
Miner ID: Facilitating bitcoin as a service
Block production in Bitcoin, often referred to as mining, is becoming increasingly industrialized. Many nodes in the network are represented by registered business entities.
Wei Zhang
doaj +1 more source
Resource public key infrastructure RPKI: status and problems
The BGP (border gateway protocol) did not fully consider security issues at the beginning of its design.With the rapid growth of the Internet, its security risks have become incrementally obvious.Academia and industry have proposed many solutions to the ...
Yingying SU, Dan LI, Honglin YE
doaj +2 more sources
Non-Invertible Public Key Certificates
Post-quantum public cryptosystems introduced so far do not define a scalable public key infrastructure for the quantum era. We demonstrate here a public certification system based on Lizama’s non-invertible key exchange protocol which can be used to ...
Luis Adrián Lizama-Perez +1 more
doaj +1 more source
An identity-based key infrastructure suitable for messaging applications [PDF]
—Identity-based encryption (IBE) systems are relatively recently proposed; yet they are highly popular for messaging applications since they offer new features such as certificateless infrastructure and anonymous communication. In this paper, we intended
Karatop, Ayse Gul +3 more
core +2 more sources
Application of public key infrastructure in telecom operators
With the implementation of cryptography law,the application of cryptography in information system in China has been promoted to the legal level,which requires the application of public key infrastructure in the mutual trust of network entities to be ...
Congli WANG, Jinhua WANG, Weijia XUE
doaj +2 more sources
An efficient voting based decentralized revocation protocol for vehicular ad hoc networks
Vehicular Ad-hoc NETworks (VANETs) enable cooperative behaviors in vehicular environments and are seen as an integral component of Intelligent Transportation Systems (ITSs). The security of VANETs is crucial for their successful deployment and widespread
Miraj Asghar, Lei Pan, Robin Doss
doaj +1 more source
Blockchain-based high transparent PKI authentication protocol
The public key infrastructure (PKI), as an significant component of the current Internet security infrastructure, guarantees the information transmission with the necessary authenticity, integrity, confidentiality and non-repudiation.However, the ...
Liquan CHEN +3 more
doaj +3 more sources
This research study identifies a specific layer of regulation within the governance regime which is a key factor impeding the procurement and delivery of public infrastructure in South Africa.
Jonathan Klaaren, Ron Watermeyer
doaj +1 more source
Privacy-aware multi-context RFID infrastructure using public key cryptography [PDF]
We propose a novel RFID infrastructure design, which foresees the usage of a single RFID tag within different contexts and for multiple purposes.
A. Juels +8 more
core +1 more source
Crypto-test-lab for security validation of ECC co-processor test infrastructure [PDF]
© 20xx IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting /republishing this material for advertising or promotional purposes, creating new ...
Lupón Roses, Emilio +2 more
core +1 more source

