Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Renu Mary Daniel"'
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 33, Iss 1, Pp 86-98 (2021)
Signcryption is an authenticated encryption technique that concurrently establishes message confidentiality, authenticity, integrity and non-repudiation. In this paper, we propose an efficient signcryption scheme, based on the hardness of RSA assumpt
Externí odkaz:
https://doaj.org/article/5bb812cca2924bd5a663ebb0476aa3ed
Publikováno v:
2021 International Conference on Advances in Computing and Communications (ICACC).
Publikováno v:
Journal of Information Security and Applications. 47:156-172
Authenticated Key Agreement (AKA) protocol enables two communicating entities to mutually establish a session key, in such a way that each entity is assured of the authenticity of its peer. Certificateless AKA (CL-AKA) protocols are widely researched
Intervehicular ad hoc networks are designed to facilitate direct communications among vehicles to ensure safer roads, reduce traffic congestion, and enhance travel comfort. Automotive vehicular information such as vehicle coordinates, speed, traffic
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::511caebf2670cf70e7ed23b6861af363
https://doi.org/10.1016/b978-0-12-816385-6.00002-7
https://doi.org/10.1016/b978-0-12-816385-6.00002-7
Autor:
S. Chandrakala, Renu Mary Daniel, K. Deepak, P. Deepan, Sharmila Anand John Francis, Deva Priya Isravel, Titus Issac, T. Anita Jones, Aldrin Karunakaran, P.U. Krishnanugrah, G. Pradeep Kumar, R.J.S. Jeba Kumar, Murugan Mahalingam, K. Mahesh, S. Malini, Anitha Mary, D. Mohanapriya, Vijay Rajeev, Revathi Arumugam Rajendran, Elijah Blessing Rajsingh, Preethi Sambandam Raju, Lina Rose, S. Roshan, K.S. Senthilkumar, N. Shreyas, Salaja Silas, P. Sreevidya, B. Sridevi, G. Srivathsan, L.R. Sudha, D. Sugumar, G. Thennarasi, S. Veni, M. Venkatraman
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::55ecbbb8536e39a3920daf2229437aad
https://doi.org/10.1016/b978-0-12-816385-6.00018-0
https://doi.org/10.1016/b978-0-12-816385-6.00018-0
Publikováno v:
Journal of Information Security and Applications. 36:20-31
Hierarchical Identity Based Encryption (HIBE) enhances the scalability of Identity based encryption scheme, by sharing the workload of the root Private Key Generator (PKG) among multiple lower-level PKGs, facilitating intermediate key escrows and pri
Publikováno v:
Information and Computation. 275:104630
A Two-Party Authenticated Key Agreement (2-PAKA) protocol facilitates two communicating entities to equally contribute to the establishment of a shared session key. IDentity-based 2-PAKA (ID-2-PAKA) protocols are widely researched, since it eliminate
Publikováno v:
Procedia Computer Science. 93:839-846
Massively Multiplayer Online Role Playing Games (MMORPGs) are virtual environments that allow players to socialize, compete, contribute, produce and consume goods leading to an intricate lifestyle resembling real world. With millions of subscribers p
Publikováno v:
International Journal of Computer Applications Technology and Research. 2:94-98
Trust is an indispensable part of the computing environment, the validity of any transaction or information depends heavily on the authenticity of the information source. In this context, many mechanisms for ensuring the authenticity of the informati