scroll to top
0
Your source for trusted research content

EBSCO Auth Banner

Let's find your institution. Click here.

Advanced Search Results For "PUBLIC key infrastructure (Computer security)"

1 - 10 of 1,163 results for
 "PUBLIC key infrastructure (Computer security)"
Results per page:

Post-Quantum Cryptography: Cryptographers seek algorithms quantum computers cannot break.

Publication Type: Periodical

Source(s): Communications of the ACM; Feb2023, Vol. 66 Issue 2, p15-17, 3p, 1 Color Photograph

Authors:

Abstract: This article details the evaluation process for post-quantum cryptography conducted by the United States National Institute of Standards and Technology, NIST. Post-quantum cryptography would combat the use of quantum computing to crack public keys used...

Hybrid Trust Based Reputation Mechanism for Discovering Malevolent Node in MANET.

Publication Type: Academic Journal

Source(s): Computer Systems Science & Engineering; 2023, Vol. 44 Issue 3, p2776-2789, 15p

Abstract: Copyright of Computer Systems Science & Engineering is the property of Tech Science Press and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users m...

An Efficient and Conditional Privacy-Preserving Heterogeneous Signcryption Scheme for the Internet of Drones.

Publication Type: Academic Journal

Source(s): Sensors (14248220); Feb2023, Vol. 23 Issue 3, p1063, 16p

Abstract: Copyright of Sensors (14248220) is the property of MDPI and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email artic...

HSC-MET: Heterogeneous signcryption scheme supporting multi-ciphertext equality test for Internet of Drones.

Publication Type: Academic Journal

Source(s): PLoS ONE. 9/29/2022, Vol. 17 Issue 9, p1-19. 19p.

Abstract: Internet of Drones (IoD) is considered as a network and management architecture, which can enable unmanned aerial vehicles (UAVs) to collect data in controlled areas and conduct access control for UAVs. However, the current cloud-assisted IoD scheme ca...

AutoCert: Automated TOCTOU-secure digital certification for IoT with combined authentication and assurance.

Publication Type: Academic Journal

Source(s): Computers & Security. Jan2023, Vol. 124, pN.PAG-N.PAG. 1p.

Abstract: The Internet of Things (IoT) network is comprised of heterogeneous devices which are part of critical infrastructures throughout the world. To enable end-to-end security, the Public Key Infrastructure (PKI) is undergoing advancements to incorporate IoT...

Building trust of Blockchain-based Internet-of-Thing services using public key infrastructure.

Publication Type: Academic Journal

Source(s): Enterprise Information Systems; Dec2022, Vol. 16 Issue 12, p1-24, 24p

Abstract: Copyright of Enterprise Information Systems is the property of Taylor & Francis Ltd and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may pri...

Enhancing Cyber Security of LoRaWAN Gateways under Adversarial Attacks.

Publication Type: Academic Journal

Source(s): Sensors (14248220); May2022, Vol. 22 Issue 9, p3498-3498, 18p

Abstract: Copyright of Sensors (14248220) is the property of MDPI and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email artic...

A Novel Post-Quantum Blind Signature for Log System in Blockchain.

Publication Type: Academic Journal

Source(s): Computer Systems Science & Engineering; 2022, Vol. 41 Issue 3, p945-958, 14p

Abstract: Copyright of Computer Systems Science & Engineering is the property of Tech Science Press and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users m...

Provable Data Possession Schemes from Standard Lattices for Cloud Computing.

Publication Type: Academic Journal

Source(s): Computer Journal; Dec2022, Vol. 65 Issue 12, p3223-3239, 17p

Abstract: Copyright of Computer Journal is the property of Oxford University Press / USA and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, d...

Implementation & Security Analysis for RSA based Algorithms on Variable Key Length.

Publication Type: Academic Journal

Source(s): International Journal of Advanced Research in Computer Science. May/Jun2017, Vol. 8 Issue 5, p302-310. 9p.

Abstract: Cryptography provides confidentiality, integrity and availability. It is used to provide security and to communicate securely while the data is in transmission or at rest. Public key cryptography is used to implement these security mechanisms using sec...

sponsored