Works matching DE "PUBLIC key infrastructure (Computer security)"
Results: 242
Advanced Secured Routing Algorithm of Vehicular Ad-Hoc Network.
- Published in:
- Wireless Personal Communications, 2018, v. 102, n. 1, p. 41, doi. 10.1007/s11277-018-5824-0
- By:
- Publication type:
- Article
Mobility Aware Clustering Scheme with Bayesian- Evidence Trust Management for Public Key Infrastructure in Ad Hoc Networks.
- Published in:
- Wireless Personal Communications, 2018, v. 99, n. 1, p. 371, doi. 10.1007/s11277-017-5107-1
- By:
- Publication type:
- Article
An Enhanced Certificateless Signcryption in the Standard Model.
- Published in:
- Wireless Personal Communications, 2018, v. 98, n. 3, p. 2693, doi. 10.1007/s11277-017-4995-4
- By:
- Publication type:
- Article
Enhanced Security Using Cluster Based Certificate Management and ECC-CRT Key Agreement Schemes in Mobile Ad hoc Networks.
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 4, p. 6131, doi. 10.1007/s11277-017-4830-y
- By:
- Publication type:
- Article
Nonlinear Cryptosystem Based on QC-LDPC Codes for Enhanced Security and Reliability with Low Hardware Complexity and Reduced Key Size.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 3, p. 4177, doi. 10.1007/s11277-017-4376-z
- By:
- Publication type:
- Article
A New Self-Certified Signature Scheme Based on NTRUS ing for Smart Mobile Communications.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 3, p. 4263, doi. 10.1007/s11277-017-4385-y
- By:
- Publication type:
- Article
Weighted Clustering Trust Model for Mobile Ad Hoc Networks.
- Published in:
- Wireless Personal Communications, 2017, v. 94, n. 4, p. 2203, doi. 10.1007/s11277-016-3371-0
- By:
- Publication type:
- Article
Design of Two-Party Authenticated Key Agreement Protocol Based on ECC and Self-Certified Public Keys.
- Published in:
- Wireless Personal Communications, 2015, v. 82, n. 4, p. 2727, doi. 10.1007/s11277-015-2375-5
- By:
- Publication type:
- Article
An Ideal Multi-secret Sharing Scheme Based on Connectivity of Graphs.
- Published in:
- Wireless Personal Communications, 2014, v. 77, n. 1, p. 383, doi. 10.1007/s11277-013-1511-3
- By:
- Publication type:
- Article
Beaconing Approaches in Vehicular Ad Hoc Networks: A Survey.
- Published in:
- Wireless Personal Communications, 2013, v. 73, n. 3, p. 885, doi. 10.1007/s11277-013-1222-9
- By:
- Publication type:
- Article
Efficient Authentication and Key Agreement Protocol with Anonymity for Delay Tolerant Networks.
- Published in:
- Wireless Personal Communications, 2013, v. 70, n. 4, p. 1473, doi. 10.1007/s11277-012-0760-x
- By:
- Publication type:
- Article
The ultimate physical limits of privacy.
- Published in:
- Nature, 2014, v. 507, n. 7493, p. 443, doi. 10.1038/nature13132
- By:
- Publication type:
- Article
INTERNET OF THINGS: A REVIEW ARTICLE.
- Published in:
- i-Manager's Journal On Cloud Computing, 2018, v. 5, n. 1, p. 20, doi. 10.26634/jcc.5.1.14276
- By:
- Publication type:
- Article
Leakage-Resilient Outsourced Revocable Certificateless Signature with a Cloud Revocation Server.
- Published in:
- Information Technology & Control, 2020, v. 49, n. 4, p. 464, doi. 10.5755/j01.itc.49.4.25927
- By:
- Publication type:
- Article
Leakage-Resilient Certificateless Signature Under Continual Leakage Model.
- Published in:
- Information Technology & Control, 2018, v. 47, n. 2, p. 363, doi. 10.5755/j01.itc.47.2.17847
- By:
- Publication type:
- Article
Anonymous Identity Authentication Scheme for VANETs.
- Published in:
- Journal of Coastal Research, 2020, v. 104, p. 203, doi. 10.2112/JCR-SI104-037.1
- By:
- Publication type:
- Article
Analytical models for capacity estimation of IEEE 802.11 WLANs using DCF for internet applications.
- Published in:
- Wireless Networks (10220038), 2009, v. 15, n. 2, p. 259, doi. 10.1007/s11276-007-0051-8
- By:
- Publication type:
- Article
Key Management Schemes for Multilayer and Multiple Simultaneous Secure Group Communication.
- Published in:
- ISRN Communications & Networking, 2012, p. 1, doi. 10.5402/2012/383218
- By:
- Publication type:
- Article
Blockchain-Driven Decentralization of Electronic Health Records in Saudi Arabia: An Ethereum-Based Framework for Enhanced Security and Patient Control.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 4, p. 1104, doi. 10.14569/ijacsa.2024.01504112
- By:
- Publication type:
- Article
Development of a New Chaotic Function-based Algorithm for Encrypting Digital Images.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 4, p. 264, doi. 10.14569/ijacsa.2024.0150427
- By:
- Publication type:
- Article
MODEL FOR PKI INTEROPERABILITY IN SERBIA.
- Published in:
- Military Technical Courier / Vojnotehnicki Glasnik, 2017, v. 65, n. 2, p. 530, doi. 10.5937/vojtehg65-11041
- By:
- Publication type:
- Article
STRATEGIJA RAZVOJA INFORMACIONOG DRUŠTVA U REPUBLICI SRBIJI DO 2020. GODINE: BEZBEDNOST INFORMACIJA I KRITIČNA INFRASTRUKTURA.
- Published in:
- Military Technical Courier / Vojnotehnicki Glasnik, 2012, v. 60, n. 4, p. 82, doi. 10.5937/vojtehg1204082P
- By:
- Publication type:
- Article
PROTOKOLI I PRAVCI RAZVOJA KVANTNE KRIPTOGRAFIJE.
- Published in:
- Military Technical Courier / Vojnotehnicki Glasnik, 2012, v. 60, n. 1, p. 250
- By:
- Publication type:
- Article
A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems.
- Published in:
- Symmetry (20738994), 2016, v. 8, n. 9, p. 85, doi. 10.3390/sym8090085
- By:
- Publication type:
- Article
WHAT TRUST IS IN THESE TIMES? EXAMINING THE FOUNDATION OF ONLINE TRUST.
- Published in:
- Emory Law Journal, 2005, v. 54, n. 3, p. 1441
- By:
- Publication type:
- Article
Building trust of Blockchain-based Internet-of-Thing services using public key infrastructure.
- Published in:
- Enterprise Information Systems, 2022, v. 16, n. 12, p. 1, doi. 10.1080/17517575.2022.2037162
- By:
- Publication type:
- Article
An Efficient Heterogeneous Ring Signcryption Scheme for Wireless Body Area Networks.
- Published in:
- Computer Systems Science & Engineering, 2023, v. 47, n. 2, p. 2061, doi. 10.32604/csse.2023.040483
- By:
- Publication type:
- Article
Hybrid Trust Based Reputation Mechanism for Discovering Malevolent Node in MANET.
- Published in:
- Computer Systems Science & Engineering, 2023, v. 44, n. 3, p. 2776, doi. 10.32604/csse.2023.029345
- By:
- Publication type:
- Article
A Novel Post-Quantum Blind Signature for Log System in Blockchain.
- Published in:
- Computer Systems Science & Engineering, 2022, v. 41, n. 3, p. 945, doi. 10.32604/csse.2022.022100
- By:
- Publication type:
- Article
A CPK-Based Identity Authentication Scheme for IoT.
- Published in:
- Computer Systems Science & Engineering, 2022, v. 40, n. 3, p. 1217, doi. 10.32604/csse.2022.017657
- By:
- Publication type:
- Article
Secure Information Access Strategy for a Virtual Data Centre.
- Published in:
- Computer Systems Science & Engineering, 2020, v. 35, n. 5, p. 357, doi. 10.32604/csse.2020.35.357
- By:
- Publication type:
- Article
A cross-authentication model and implementation.
- Published in:
- Computer Systems Science & Engineering, 2008, v. 23, n. 3, p. 167
- By:
- Publication type:
- Article
Evaluating Intrusion-Tolerant Certification Authority Systems Evaluating Intrusion-Tolerant Certification Authority Systems.
- Published in:
- Quality & Reliability Engineering International, 2012, v. 28, n. 8, p. 825, doi. 10.1002/qre.1270
- By:
- Publication type:
- Article
HONEYPOT SYSTEM BASED ON SOFTWARE CONTAINERS.
- Published in:
- Scientific Bulletin 'Mircea cel Batran' Naval Academy, 2016, v. 19, n. 2, p. 415, doi. 10.21279/1454-864X-16-I2-062
- By:
- Publication type:
- Article
An Internet of Things Based Multi-Level Privacy-Preserving Access Control for Smart Living.
- Published in:
- Informatics, 2018, v. 5, n. 2, p. 23, doi. 10.3390/informatics5020023
- By:
- Publication type:
- Article
SIGNCRYPTION ANALYZE.
- Published in:
- Journal of Information Systems & Operations Management, 2012, v. 6, n. 1, p. 86
- By:
- Publication type:
- Article
Autonomous Ant-based Public Key Authentication Mechanism for Mobile Ad-hoc Networks.
- Published in:
- Mobile Networks & Applications, 2016, v. 21, n. 1, p. 149, doi. 10.1007/s11036-016-0703-y
- By:
- Publication type:
- Article
Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks.
- Published in:
- Mobile Networks & Applications, 2013, v. 18, n. 3, p. 413, doi. 10.1007/s11036-012-0406-y
- By:
- Publication type:
- Article
A combined public-key scheme in the case of attribute-based for wireless body area networks.
- Published in:
- Wireless Networks (10220038), 2019, v. 25, n. 2, p. 845, doi. 10.1007/s11276-017-1597-8
- By:
- Publication type:
- Article
Vehicle authentication via monolithically certified public key and attributes.
- Published in:
- Wireless Networks (10220038), 2016, v. 22, n. 3, p. 879, doi. 10.1007/s11276-015-1005-1
- By:
- Publication type:
- Article
Not Reinventing PKI until We Have Something Better.
- Published in:
- IEEE Internet Computing, 2011, v. 15, n. 5, p. 95, doi. 10.1109/MIC.2011.120
- By:
- Publication type:
- Article
The geopolitical vs. the network political: Internet designers and governance.
- Published in:
- International Journal of Media & Cultural Politics, 2013, v. 9, n. 3, p. 277, doi. 10.1386/macp.9.3.277_1
- By:
- Publication type:
- Article
Interdiction Models and Homeland Security Risks.
- Published in:
- Journal of Homeland Security & Emergency Management, 2011, v. 8, n. 1, p. 1, doi. 10.2202/1547-7355.1785
- By:
- Publication type:
- Article
ACCESSING SERVICES WITH CLIENT DIGITAL CERTIFICATES: A SHORT REPORT FROM THE DCOCE PROJECT.
- Published in:
- New Review of Information Networking, 2004, v. 10, n. 2, p. 193, doi. 10.1080/13614570500091940
- By:
- Publication type:
- Article
Biometrics as an authentication method in a public key infrastructure.
- Published in:
- Przegląd Elektrotechniczny, 2017, v. 93, n. 1, p. 60, doi. 10.15199/48.2017.01.15
- By:
- Publication type:
- Article
Social Representations of Cybersecurity by University Students and Implications for Instructional Design.
- Published in:
- Journal of Information Systems Education, 2015, v. 26, n. 4, p. 281
- By:
- Publication type:
- Article
A Blockchain-Based Decentralized Public Key Infrastructure for Information-Centric Networks.
- Published in:
- Information (2078-2489), 2022, v. 13, n. 5, p. 264, doi. 10.3390/info13050264
- By:
- Publication type:
- Article
Biometric-based key management for satisfying patient's control over health information in the HIPAA regulations.
- Published in:
- KSII Transactions on Internet & Information Systems, 2020, v. 14, n. 1, p. 437, doi. 10.3837/tiis.2020.01.024
- By:
- Publication type:
- Article
Identity-based Deniable Authenticated Encryption for E-voting Systems.
- Published in:
- KSII Transactions on Internet & Information Systems, 2019, v. 13, n. 6, p. 3299, doi. 10.3837/tiis.2019.06.029
- By:
- Publication type:
- Article
Circulant UOV: a new UOV variant with shorter private key and faster signature generation.
- Published in:
- KSII Transactions on Internet & Information Systems, 2018, v. 12, n. 3, p. 1376, doi. 10.3837/tiis.2018.03.022
- By:
- Publication type:
- Article