WebIBC: Identity based cryptography for client side security in web applications

Z Guan, Z Cao, X Zhao, R Chen… - 2008 The 28th …, 2008 - ieeexplore.ieee.org
The growing popularity of web applications in the last few years has led users to give the
management of their data to online application providers, which will endanger the security …

A web database Security model using the Host identity protocol

X Zhu, JW Atwood - 11th International Database Engineering …, 2007 - ieeexplore.ieee.org
Web database security is a very important issue in e-commerce. This paper presents a new
Web database security model. It utilizes the host identity protocol (HIP), which is being …

Client controlled security for web applications

M Hassinen, P Mussalo - … Networks 30th Anniversary (LCN'05) l, 2005 - ieeexplore.ieee.org
The main contribution of this paper is an encryption system for Web applications, where the
encryption is done on the client side. By a Web application we mean an application that …

What can identity-based cryptography offer to web services?

J Crampton, HW Lim, KG Paterson - … of the 2007 ACM workshop on …, 2007 - dl.acm.org
Web services are seen as the enabler of service-oriented computing, a promising next
generation distributed computing technology. Independently, identity-based cryptography is …

Study on Security of Web-Based Database

Q Zhao, S Qin - 2008 IEEE Pacific-Asia Workshop on …, 2008 - ieeexplore.ieee.org
Web database is a combined production with database technology and Web technology, it
stores and manages a great deal of data, if they are embezzled or juggled, which maybe …

Design of secure communications network system based on data encryption and digital signature

T Mo, J Wang, W Mo - 2011 International Conference on High …, 2011 - ieeexplore.ieee.org
This paper proposes a kind of Identity-Based Cryptograph (IBC) technique which based on
password identification, we give a corresponding brief introduction on the characteristics …

A single sign-on scheme for cross domain web applications using identity-based cryptography

Y Wang, Q Wen, H Zhang - 2010 Second International …, 2010 - ieeexplore.ieee.org
In this paper, we proposed a novel scheme to satisfy the requirement of cross domain
application single sign on. Identity based encryption and signature have been applied in this …

Efficient identity-based key issue with TPM

Z Guan, H Sun, Z Chen, X Nan - 2008 The 9th International …, 2008 - ieeexplore.ieee.org
In spite of many advantages the identity-based cryptosystem provides over traditional public
key based cryptosystem, the paradigm requires frequently user authentication and secure …

Practical implementation of identity based encryption for secure e-mail communication

A Kihidis, K Chalkias… - 2010 14th Panhellenic …, 2010 - ieeexplore.ieee.org
Identity Based Encryption (IBE) constitutes an alternative cryptographic method to the
conventional public key systems. The main feature of IBE is that public keys are not …

A proposal of efficient scheme of key management using ID-based encryption and Biometrics

K Sakurai, Y Ueshige, A Izumi - 2007 International Conference …, 2007 - ieeexplore.ieee.org
In the information exchange through network, the security risks always exists, that is
eavesdropping, defacing, and spoofing by the attacker. Crypthography, digital signature …