WebCloud: Web-based cloud storage for secure data sharing across platforms

S Sun, H Ma, Z Song, R Zhang - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
With more and more data moving to the cloud, privacy of user data have raised great
concerns. Client-side encryption/decryption seems to be an attractive solution to protect data …

Combining Mediated and Identity-Based Cryptography for Securing E-Mail.

STF Al-Janabi, HK Abd-Alrazzaq - DEIS, 2011 - books.google.com
This work aims to exploit a distinguished method of the public key cryptography which is
known as Identity-Based Cryptography (IBC) to solve the usability problem of secure e-mail …

Towards a holistic framework for secure, privacy-aware, and trustworthy internet of things using resource-efficient cryptographic schemes

M Hossain - 2018 - search.proquest.com
The increased deployment of Internet of Things (IoT) based systems make smart devices
target for malicious attacks. These devices can also be used as tools for committing crimes …

Cross-platform identity-based cryptography using WebAssembly

Á Vécsi, A Bagossy, A Pethő - Infocommunications journal, 2019 - real.mtak.hu
The explosive spread of the devices connected to the Internet has increased the need for
efficient and portable cryptographic routines. Despite this fact, truly platformindependent …

An application layer non-repudiation wireless system: A cross-layer approach

S Adibi - 2010 IEEE International Symposium on" A World of …, 2010 - ieeexplore.ieee.org
Non-repudiation techniques are to ensure any communication taking place between two or
more parties will be undeniable. Therefore it is crucial to include digital signatures of the …

A strong authentication with key agreement scheme for web-based collaborative systems

YF Lu, PH Lin, SS Ye, RS Wang… - … on Intelligent Signal …, 2012 - ieeexplore.ieee.org
This paper presents a two-factor authentication with key agreement scheme for web-based
collaborative systems. The proposed mechanism integrates URI fragment identifier with …

Elliptic curve cryptography in javascript

L Haustenne, Q De Neyer, O Pereira - Cryptology ePrint Archive, 2011 - eprint.iacr.org
We document our development of a library for elliptic curve cryptography in JavaScript. We
discuss design choices and investigate optimizations at various levels, from integer …

Towards privacy-enhancing identity management in mashup-providing platforms

J Zibuschka, M Herbert, H Roßnagel - … and Privacy XXIV: 24th Annual IFIP …, 2010 - Springer
Mashups empower users to easily combine and connect resources from independent Web-
based sources and domains. However, these characteristics also introduce new and amplify …

Secure mashup-providing platforms-implementing encrypted wiring

M Herbert, T Thieme, J Zibuschka… - Current Trends in Web …, 2012 - Springer
Mashups were not designed with security in mind. Their main selling point is the flexible and
easy to use development approach. The fact that mashups enable users to compose …

Combining mediated and identity-based cryptography for securing E-mail

ST Faraj Al-Janabi, HK Abd-Alrazzaq - International Conference on Digital …, 2011 - Springer
This work aims to exploit a distinguished method of the public key cryptography which is
known as Identity-Based Cryptography (IBC) to solve the usability problem of secure e-mail …