Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "Identity-Based Cryptography"

ADD TO MY LIST
 
Provably Secure Identity-based Threshold Key Escrow from Pairing

Author(s): Yu Long | Zheng Gong | Kefei Chen | Shengli Liu
BIOMETRIC CRYPTOGRAPHY AND NETWORK AUTHENTICATION

Author(s): Tonimir Kišasondi | Miroslav Bača | Alen Lovrenčić
Traffic Filtering and Routing in Partially-Hidden Networks

Author(s): D. Nali, A. Miri | C. Adams
ID-based Signcryption Scheme with (t,n) Shared Unsigncryption

Author(s): Fagen Li | Xiangjun Xin | Yupu Hu
Identity Authentication and Key Agreement Schemes for Ad Hoc Networks

Author(s): Mohammad A. AL-Fayoumi | Sattar J. Aboud
Parallel Hardware Architectures for the Cryptographic Tate Pairing

Author(s): Guido M. Bertoni | Luca Breveglieri | Pasqualina Fragneto | Gerardo Pelosi
Defending Mechanisms Against Sybil Attack in Next Generation Mobile Ad Hoc Networks

Author(s): Pal Sarit | Mukhopadhyay Asish | Bhattacharya Partha
Identity-Based Key Management in MANETs using Public Key Cryptography

Author(s): Dr. Anil Kapil | Mr. Sanjeev Rana
An ID-based Blind Signature Scheme from Bilinear Pairings

Author(s): B.Umaprasada Rao | K.A.Ajmath
Secure Communication in Mobile Ad Hoc Network using Efficient Certificateless Encryption,

Author(s): Peter Hyun-Jeen Lee | Udaya Parampalli | Shivaramakrishnan Narayan
Secure Iris Authentication Using Visual Cryptography

Author(s): P.S. Revenkar, | Anisa Anjum | W. Z. Gandhare
Security Proof of the Original SOK-IBS Scheme

Author(s): Xiao-Ming Lu | Deng-Guo Feng
An Attack on Libert et al.’s ID-Based Undeniable Signature Scheme

Author(s): Zichen Li | C. F. Chong | Lucas Chi-Kwong Hui | Siu-Ming Yiu | K. P. Chow | Wai-Wan Tsang | H. W. Chan | Kelvin K. H. Pun
Identity Based Color Image Cryptography

Author(s): Gopi Krishnan S | Loganathan D
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATION

Author(s): Mohamed Abid | Songbo Song | Hassnaa Moustafa | Hossam Afifi
Programming Highly Parallel Reconfigurable Architectures for Symmetric and Asymmetric Cryptographic Applications

Author(s): Giovanni Agosta | Luca Breveglieri | Gerardo Pelosi | Martino Sykora
An Improvement of Liou et al.’s Authentication Scheme using Smart Cards

Author(s): Sandeep K. Sood | Anil K. Sarje | Kuldip Singh
An Identity-based Mediated Signature Scheme from Bilinear Pairing

Author(s): Xiangguo Cheng | Lifeng Guo | Xinmei Wang
Constructing Efficient Certificateless Public Key Encryption with Pairing

Author(s): Yijuan Shi | Jianhua Li | Jianjun Shi
Fault Attack and Countermeasures on Pairing Based Cryptography

Author(s): Santosh Ghosh | Debdeep Mukhopadhyay | Dipanwita Roy Chowdhury
A Solution of Secure User-to-SP Messaging Using Identity-Based Cryptography

Author(s): Yu Dingguo | Chen Nan | Tan Chengxiang
A Novel Approach for Iris Encryption

Author(s): Shrinivasrao B. Kulkarni | Ravindra S. Hegadi | Umakant P. Kulkarni
Achieving Identity-Based Cryptography in a Personal Digital Assistant Device

Author(s): L. Martínez-Ramos | L. López-García | F. Rodríguez-Henríquez
Mediated Certificateless Signature without Random Oracles

Author(s): Minghui Zheng | Jing Zhang | Zhi Zhang
Efficient Certificateless Signcryption Scheme from Weil Pairing

Author(s): Gang Yu | Hongzhi Yang | Shuqin Fan | Yong Shen | Wenbao Han
Generalized Hierarchical Identity-Based Signcryption

Author(s): Hao Wang | Qiuliang Xu | Xiufeng Zhao
Guest Editorial

Author(s): Lei Shu | Hsiao-Hwa Chen | Takahiro Hara | Der-Jiunn Deng | Lei Wang
IKM -- An Identity based Key Management Scheme for Heterogeneous Sensor Networks

Author(s): Manel Boujelben | Habib Youssef | Rania Mzid | Mohamed Abid
A Short Identity-based Signcryption Scheme in the Multi-PKG over the VANETs

Author(s): Jianhong Zhang | Yuanbo Cui | Xiuna Su
A Survey of Identity-based Signcryption

Author(s): Li Fagen | Khan Muhammad
Fractal (Mandelbrot and Julia) Zero-Knowledge Proof of Identity

Author(s): Mohammad A. Alia | Azman B. Samsudin

Tango Jona
Tangokurs Rapperswil-Jona

     Affiliate Program