نتایج جستجو برای: public key cryptography

تعداد نتایج: 917476  

Journal: :Advances in Mathematics of Communications 2010

Journal: :Applied sciences 2022

Some public-key cryptosystems based on the tropical semiring have been proposed in recent years because of their increased efficiency, since multiplication is actually an ordinary addition numbers and there no semiring. However, most these security defects they adopt a public matrix to construct commutative semirings. This paper proposes new circular matrices. The relies NP-hard problem solving...

Journal: :International journal of Computer Networks & Communications 2015

Journal: :International Journal of Network Security & Its Applications 2011

2004
Malek Bechlaghem Vincent Rijmen

In the context of a validation server, or more general PKI server, it could be interesting to give the server the possibility to check whether a certain public key was used. We investigate here some possibilities. We also present an escrow system as an application of the technology.

Journal: :IACR Cryptology ePrint Archive 2014
Mohammed Hassouna Mohsin Hashim

This paper extends the certificateless public key infrastructure model that was proposed by Hassouna et al by proposing new digital signature scheme to provide true non-repudiation, the proposed signature scheme is short and efficient, it is also has strength point that the KGC has no contribution in signature generation/verification process, therefore any compromise of the KGC does not affect ...

2008
Daryl Walleck Yingjiu Li Shouhuai Xu

Managing public key certificates revocation has long been a central issue in public key infrastructures. Though various certificate revocation mechanisms have been proposed to address this issue, little effort has been devoted to the empirical analysis of real-world certificate revocation data. In this paper, we conduct such an empirical analysis based on a large amount of data collected from V...

2006
Tobias Straub

Introduction Contrary to analysts’ forecasts we heard some years ago, PKI (public key infrastructure) has not become a widespread technology yet. An important reason for this is the insufficient usability PKI-enabled applications are often blamed for [11]. Users’ behavior has turned out to be the biggest risk in security software [10], so usability issues deserve closer attention. Research in t...

2015
Andrew Wong Vicky Liu William J. Caelli Tony R. Sahama

This paper addresses the development of trust in the use of Open Data through incorporation of appropriate authentication and integrity parameters for use by end user Open Data application developers in an architecture for trustworthy Open Data Services.The advantages of this architecture scheme is that it is far more scalable, not another certificate authority hierarchy with massive dispersion...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید