Results 11 to 20 of about 1,300,731 (292)

Miner ID: Facilitating bitcoin as a service

open access: yesFrontiers in Blockchain, 2023
Block production in Bitcoin, often referred to as mining, is becoming increasingly industrialized. Many nodes in the network are represented by registered business entities.
Wei Zhang
doaj   +1 more source

Resource public key infrastructure RPKI: status and problems

open access: yesDianxin kexue, 2021
The BGP (border gateway protocol) did not fully consider security issues at the beginning of its design.With the rapid growth of the Internet, its security risks have become incrementally obvious.Academia and industry have proposed many solutions to the ...
Yingying SU, Dan LI, Honglin YE
doaj   +2 more sources

Non-Invertible Public Key Certificates

open access: yesEntropy, 2021
Post-quantum public cryptosystems introduced so far do not define a scalable public key infrastructure for the quantum era. We demonstrate here a public certification system based on Lizama’s non-invertible key exchange protocol which can be used to ...
Luis Adrián Lizama-Perez   +1 more
doaj   +1 more source

An identity-based key infrastructure suitable for messaging applications [PDF]

open access: yes, 2007
—Identity-based encryption (IBE) systems are relatively recently proposed; yet they are highly popular for messaging applications since they offer new features such as certificateless infrastructure and anonymous communication. In this paper, we intended
Karatop, Ayse Gul   +3 more
core   +2 more sources

Application of public key infrastructure in telecom operators

open access: yesDianxin kexue, 2020
With the implementation of cryptography law,the application of cryptography in information system in China has been promoted to the legal level,which requires the application of public key infrastructure in the mutual trust of network entities to be ...
Congli WANG, Jinhua WANG, Weijia XUE
doaj   +2 more sources

An efficient voting based decentralized revocation protocol for vehicular ad hoc networks

open access: yesDigital Communications and Networks, 2020
Vehicular Ad-hoc NETworks (VANETs) enable cooperative behaviors in vehicular environments and are seen as an integral component of Intelligent Transportation Systems (ITSs). The security of VANETs is crucial for their successful deployment and widespread
Miraj Asghar, Lei Pan, Robin Doss
doaj   +1 more source

Blockchain-based high transparent PKI authentication protocol

open access: yes网络与信息安全学报, 2022
The public key infrastructure (PKI), as an significant component of the current Internet security infrastructure, guarantees the information transmission with the necessary authenticity, integrity, confidentiality and non-repudiation.However, the ...
Liquan CHEN   +3 more
doaj   +3 more sources

Reforming procurement standards in order to effectively deliver public infrastructure: Rethinking the regulatory environment in post-pandemic South Africa

open access: yesSouth African Journal of Economic and Management Sciences, 2022
This research study identifies a specific layer of regulation within the governance regime which is a key factor impeding the procurement and delivery of public infrastructure in South Africa.
Jonathan Klaaren, Ron Watermeyer
doaj   +1 more source

Privacy-aware multi-context RFID infrastructure using public key cryptography [PDF]

open access: yes, 2007
We propose a novel RFID infrastructure design, which foresees the usage of a single RFID tag within different contexts and for multiple purposes.
A. Juels   +8 more
core   +1 more source

Crypto-test-lab for security validation of ECC co-processor test infrastructure [PDF]

open access: yes, 2018
© 20xx IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting /republishing this material for advertising or promotional purposes, creating new ...
Lupón Roses, Emilio   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy