Sign Up to like & get
recommendations!
0
Published in 2020 at "International Journal of Theoretical Physics"
DOI: 10.1007/s10773-019-04377-0
Abstract: Designated verifier signatures are very useful in the applications such as e-voting and auction. In this paper, an identity-based quantum designated verifier signature (IDQDVS) scheme is proposed. It has the security properties such as designated…
read more here.
Keywords:
designated verifier;
identity based;
signature;
verifier signature ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2019 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-019-7155-x
Abstract: Digital certificate validation associated with traditional public key cryptosystems make it impractical in real-world environments due to their storage cost. The identity-based cryptosystems have been proven advantageous as they do not require any digital certificate…
read more here.
Keywords:
key;
private key;
identity based;
secure key ... See more keywords
Photo from archive.org
Sign Up to like & get
recommendations!
1
Published in 2017 at "Science China Information Sciences"
DOI: 10.1007/s11432-017-9412-3
Abstract: According to the two types of identity mapping in existed IBE schemes: one type is GPV-IBE [1] and another is other lattice-based IBE schemes [2–7], there are two types of vector ciphertexts in original IBE…
read more here.
Keywords:
ibe schemes;
multi identity;
compact multi;
identity based ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "Journal of Ambient Intelligence and Humanized Computing"
DOI: 10.1007/s12652-017-0650-x
Abstract: To simplify the key management processes, data transmission protocols for vehicular ad-hoc networks typically use identity-based cryptography for protecting the transmitted data. However, current identity-based data transmission protocols are mainly based on the bilinear map…
read more here.
Keywords:
based data;
efficient;
data transmission;
identity based ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Contemporary Educational Psychology"
DOI: 10.1016/j.cedpsych.2021.101993
Abstract: Abstract Students value school success but often experience classroom norms implying that learning is easy and succeeding in school is not difficult. Applying an identity-based motivation (IBM) lens highlights three ways succeed-with-ease-not-effort norms can undermine…
read more here.
Keywords:
school;
success;
identity based;
based motivation ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "Translational behavioral medicine"
DOI: 10.1093/tbm/ibac008
Abstract: Online peer support is increasingly important to encourage patients with chronic diseases to engage in successful self-management. However, studies mainly focus on individual-level participation and have not fully explored how to maximize the impact of…
read more here.
Keywords:
group;
peer support;
support;
identity based ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "Academic Medicine"
DOI: 10.1097/acm.0000000000004711
Abstract: Purpose To examine the incidence of, barriers to, and institutional responses to formal reporting of experiences of identity-based harassment at an academic medical center. Method The authors invited 4,545 faculty and medical trainees at the…
read more here.
Keywords:
based harassment;
cisgender women;
identity based;
institutional responses ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2841008
Abstract: Due to the advantages of low handover latency and signaling costs, Proxy Mobile IPv6 (PMIPv6), as a localized mobility management protocol for next generation mobile network, can be well combined with vehicular ad-hoc networks. However,…
read more here.
Keywords:
scheme;
authentication;
based signature;
identity based ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2852784
Abstract: Cloud computing and social networks are changing the way of healthcare by providing real-time data sharing in a cost-effective manner. However, data security issue is one of the main obstacles to the wide application of…
read more here.
Keywords:
data sharing;
cloud computing;
social networks;
identity based ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2873019
Abstract: Identity-based encryption (IBE) is a very attractive cryptographic primitive due to its unnecessity of any certificate managements. Nevertheless, the user revocation problem in IBE remains an elusive research problem and hence, it is an important…
read more here.
Keywords:
identity based;
cloud;
encryption;
ciphertext evolution ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2899680
Abstract: With the higher rate of using cloud storage, protecting data privacy becomes an important issue. The most effective solution is to encrypt data before uploading to the cloud. However, how to efficiently search over data…
read more here.
Keywords:
test;
equality test;
cloud storage;
ciphertexts ... See more keywords