Articles with "based cryptographic" as a keyword



Photo from wikipedia

A pairing-based cryptographic approach for data security in the cloud

Sign Up to like & get
recommendations!
Published in 2017 at "International Journal of Information Security"

DOI: 10.1007/s10207-017-0375-z

Abstract: This paper presents AES4SeC, a security scheme fully constructed over cryptographic pairings. The main building blocks of AES4SeC are attribute-based encryption (ABE) and short signatures (SSign), with generalized constructions for the Type 3 pairing. AES4SeC… read more here.

Keywords: approach data; security; cryptographic approach; based cryptographic ... See more keywords
Photo from wikipedia

Security of internet of things based on cryptographic algorithms: a survey

Sign Up to like & get
recommendations!
Published in 2021 at "Wireless Networks"

DOI: 10.1007/s11276-020-02535-5

Abstract: Internet of Things (IoT) is a new concept in Information and Communications Technology and its structure is based on smart objects communications. It contributes to controlling, managing, and administrating devices through the Internet. IoT is… read more here.

Keywords: things based; cryptographic algorithms; security internet; security ... See more keywords