Cargando…
Electronic Voting Protocol Using Identity-Based Cryptography
Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide cert...
Autores principales: | Gallegos-Garcia, Gina, Tapia-Recillas, Horacio |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi Publishing Corporation
2015
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4458363/ https://www.ncbi.nlm.nih.gov/pubmed/26090515 http://dx.doi.org/10.1155/2015/741031 |
Ejemplares similares
-
Proceedings of an International Conference on Coding Theory, Cryptography and Related Areas
por: Buchmann, Johannes, et al.
Publicado: (2000) -
Finite Fields with Applications to Coding Theory, Cryptography and Related Areas : Proceedings of the 6th International Conference on Finite Fields and Applications
por: Mullen, Gary, et al.
Publicado: (2002) -
Security for wireless sensor networks using identity-based cryptography
por: Patil, Harsh Kupwade, et al.
Publicado: (2013) -
Security for Wireless Sensor Networks using Identity-Based Cryptography
por: Patil, Harsh
Publicado: (2012) -
Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids
por: Zhang, Liping, et al.
Publicado: (2016)