P Szczechowiak, M Scott… - International Journal of …, 2010 - inderscienceonline.com
… requirements can be addressed by using an Identity-BasedCryptography (IBC) approach. … a practical identity-based key agreement scheme that does not require any communication …
… Data Getting and Datatransmit was done in secure manner usingsecure revocable storage Identitybasedencryption… in case of losing data while getting from client and transmitting. The …
… , we can say it is better approach for the secure information exchange in any type of network and any scale of users. This technique has its benefit over the competent techniques. …
… The main goal of this paper is to critically review identity-based security and privacy schemes … one-time identity-based aggregate signature technique for secure VANET communication. …
B Anggorojati, R Prasad - … International Workshop on Big Data …, 2017 - ieeexplore.ieee.org
… In order to ensure security of communication in IoT … Identity-BasedCryptography (IBC) is proposed in this paper. The proposed scheme is based on variant of Identity-BasedEncryption (…
HK Patil, SA Szygenda, SA Szygenda - 2013 - api.taylorfrancis.com
… addresses the problems associated with providing efficient tools to securedata or information. A number of different approaches have been developed over the years. Historically, …
S Mittal, A Bansal, D Gupta, S Juneja… - Computational …, 2022 - Wiley Online Library
… In our proposed methodology, an identity-basedencryption technique is utilized for uploading data into the clouds. The identity of the user is extracted initially to generate the public key. …
… One of the most popular methods used to securedata over the cloud is the identity-based encryption (IBE). It is an access policy that allows only authorized users to access legible data …
J Han, W Susilo, Y Mu - IEEE Transactions on computers, 2013 - ieeexplore.ieee.org
… Identity-basedcryptosystem introduced by Shamir [36] is a system where the public key can be any arbitrary string and the secret key is issued by a trusted party called the private key …