Advanced Search Results For "PUBLIC key infrastructure (Computer security)"
Your filters
Post-Quantum Cryptography: Cryptographers seek algorithms quantum computers cannot break.
Publication Type: Periodical
Source(s): Communications of the ACM; Feb2023, Vol. 66 Issue 2, p15-17, 3p, 1 Color Photograph
Abstract: This article details the evaluation process for post-quantum cryptography conducted by the United States National Institute of Standards and Technology, NIST. Post-quantum cryptography would combat the use of quantum computing to crack public keys used...
Hybrid Trust Based Reputation Mechanism for Discovering Malevolent Node in MANET.
Publication Type: Academic Journal
Source(s): Computer Systems Science & Engineering; 2023, Vol. 44 Issue 3, p2776-2789, 15p
Abstract: Copyright of Computer Systems Science & Engineering is the property of Tech Science Press and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users m...
An Efficient and Conditional Privacy-Preserving Heterogeneous Signcryption Scheme for the Internet of Drones.
Publication Type: Academic Journal
Source(s): Sensors (14248220); Feb2023, Vol. 23 Issue 3, p1063, 16p
Abstract: Copyright of Sensors (14248220) is the property of MDPI and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email artic...
HSC-MET: Heterogeneous signcryption scheme supporting multi-ciphertext equality test for Internet of Drones.
Publication Type: Academic Journal
Source(s): PLoS ONE. 9/29/2022, Vol. 17 Issue 9, p1-19. 19p.
Abstract: Internet of Drones (IoD) is considered as a network and management architecture, which can enable unmanned aerial vehicles (UAVs) to collect data in controlled areas and conduct access control for UAVs. However, the current cloud-assisted IoD scheme ca...
AutoCert: Automated TOCTOU-secure digital certification for IoT with combined authentication and assurance.
Publication Type: Academic Journal
Source(s): Computers & Security. Jan2023, Vol. 124, pN.PAG-N.PAG. 1p.
Abstract: The Internet of Things (IoT) network is comprised of heterogeneous devices which are part of critical infrastructures throughout the world. To enable end-to-end security, the Public Key Infrastructure (PKI) is undergoing advancements to incorporate IoT...
Building trust of Blockchain-based Internet-of-Thing services using public key infrastructure.
Publication Type: Academic Journal
Source(s): Enterprise Information Systems; Dec2022, Vol. 16 Issue 12, p1-24, 24p
Abstract: Copyright of Enterprise Information Systems is the property of Taylor & Francis Ltd and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may pri...
Enhancing Cyber Security of LoRaWAN Gateways under Adversarial Attacks.
Publication Type: Academic Journal
Source(s): Sensors (14248220); May2022, Vol. 22 Issue 9, p3498-3498, 18p
Abstract: Copyright of Sensors (14248220) is the property of MDPI and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email artic...
A Novel Post-Quantum Blind Signature for Log System in Blockchain.
Publication Type: Academic Journal
Source(s): Computer Systems Science & Engineering; 2022, Vol. 41 Issue 3, p945-958, 14p
Abstract: Copyright of Computer Systems Science & Engineering is the property of Tech Science Press and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users m...
Provable Data Possession Schemes from Standard Lattices for Cloud Computing.
Publication Type: Academic Journal
Source(s): Computer Journal; Dec2022, Vol. 65 Issue 12, p3223-3239, 17p
Abstract: Copyright of Computer Journal is the property of Oxford University Press / USA and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, d...
Implementation & Security Analysis for RSA based Algorithms on Variable Key Length.
Publication Type: Academic Journal
Source(s): International Journal of Advanced Research in Computer Science. May/Jun2017, Vol. 8 Issue 5, p302-310. 9p.
Abstract: Cryptography provides confidentiality, integrity and availability. It is used to provide security and to communicate securely while the data is in transmission or at rest. Public key cryptography is used to implement these security mechanisms using sec...