Two Novel E-Visas Verification Schemes Based On Public Key Infrastructure (Pki) And Identity Based Encryption (Ibe).
Visa merupakan dokumen perjalanan yang sangat penting yang membenarkan kita memasuki sesebuah negara yang akan kita lawati. Visa is a very important traveling document, which is an essential need at the point of entry of any country we are visiting.
| Main Author: | Abuadhmah, Najlaa Abdullah |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2010
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/24562/ http://eprints.usm.my/24562/1/TWO_NOVEL_E_VISAS_VERIFICATION_SCHEMES_BASED_ON_PUBLIC_KEY_INFRASTRUCTURE_PKI_AND_IDENTITY_BASED_ENCRYPTION_IBE.pdf |
Similar Items
Integrating Identity-Based Encryption (Ibe) In The Return Routability Protocol (Rrp) To Enhance Signals Security
In Mobile Ipv6.
by: S. Alsayfi, Majed Salam
Published: (2010)
by: S. Alsayfi, Majed Salam
Published: (2010)
Performance evaluation of identity-based encryption (IBE) remote attestation protocol in wireless sensor networks / Roszainiza Rosli
by: Rosli, Roszainiza
Published: (2014)
by: Rosli, Roszainiza
Published: (2014)
Secure file sharing with public key infrastructure (PKI) enablement / Noor Azlina Ismail @ Hassan
by: Ismail @ Hassan, Noor Azlina
Published: (2015)
by: Ismail @ Hassan, Noor Azlina
Published: (2015)
Identity-based encryption schemes - a review
by: Tea, Boon Chian, et al.
Published: (2019)
by: Tea, Boon Chian, et al.
Published: (2019)
k-Resilient Identity-Based Encryption in the Standard Model
by: HENG, S.-H.
Published: (2006)
by: HENG, S.-H.
Published: (2006)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
Off-line keyword guessing attacks on recent Public Key Encryption with Keyword Search Schemes
by: Wei-Chuen, Yau, et al.
Published: (2008)
by: Wei-Chuen, Yau, et al.
Published: (2008)
Pairing-based public-key encryption schemes with backward-and-forward security
by: Han, Song, et al.
Published: (2008)
by: Han, Song, et al.
Published: (2008)
Self-Verification Of Public-Key
Agreement Over Voip Using Random
Fusion Scheme
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
A new tv-based database encryption scheme using ts block cipher
by: Mohamed Sidek, Zailani, et al.
Published: (2004)
by: Mohamed Sidek, Zailani, et al.
Published: (2004)
An upgrade on the key generation algorithm of the GGH-MKA lattice-based encryption scheme
by: Arif, Mandangan, et al.
Published: (2021)
by: Arif, Mandangan, et al.
Published: (2021)
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
by: Norhidayah, Muhammad, et al.
Published: (2012)
by: Norhidayah, Muhammad, et al.
Published: (2012)
Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure
by: Khalid, Roszelinda
Published: (2018)
by: Khalid, Roszelinda
Published: (2018)
A novel key release scheme from biometrics
by: Song, , Ong Thian, et al.
Published: (2006)
by: Song, , Ong Thian, et al.
Published: (2006)
Image encryption algorithm based on chaotic mapping
by: Salleh, Mazleena, et al.
Published: (2003)
by: Salleh, Mazleena, et al.
Published: (2003)
Loop-based RSA Key Generation Algorithm using String Identity
by: Norhidayah, Muhammad, et al.
Published: (2013)
by: Norhidayah, Muhammad, et al.
Published: (2013)
MALAM ANEKARAGAM KEMUNCAK AKTIVITI PKI
by: MPRC, Pusat Media & Perhubungan Awam
Published: (2015)
by: MPRC, Pusat Media & Perhubungan Awam
Published: (2015)
Multibiometric systems based verification technique
by: Anwar, Farhat, et al.
Published: (2009)
by: Anwar, Farhat, et al.
Published: (2009)
A novel secret key generation based on image link
by: Sulaiman, Alyaa Ghanim, et al.
Published: (2018)
by: Sulaiman, Alyaa Ghanim, et al.
Published: (2018)
Design And Cryptanalysis Of Encryption And Signature Schemes Without Certificates
by: Yap, Wun She
Published: (2007)
by: Yap, Wun She
Published: (2007)
Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing
by: Lim, Tsu Chean, et al.
Published: (2018)
by: Lim, Tsu Chean, et al.
Published: (2018)
Enhance key generation algorithm based user string identity as public key
by: Norhidayah, Muhammad
Published: (2015)
by: Norhidayah, Muhammad
Published: (2015)
Cryptanalysis of the n-party encrypted Diffie-Hellman key exchange using different passwords
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
Immigrants' language skills and visa category
by: Chiswick, B., et al.
Published: (2006)
by: Chiswick, B., et al.
Published: (2006)
A light-PKI Fast Authentication Model
by: Li, D., et al.
Published: (2011)
by: Li, D., et al.
Published: (2011)
Incorporating revocation of certification into a PKI model
by: Azimzadeh, Fatemeh, et al.
Published: (2007)
by: Azimzadeh, Fatemeh, et al.
Published: (2007)
SL1M-IBE TNB pacu keupayaan graduan
by: Badrul Hafizan, Mat Isa
Published: (2017)
by: Badrul Hafizan, Mat Isa
Published: (2017)
FPGA-assisted assertion-based verification platform
by: Mohamad, Nurita, et al.
Published: (2020)
by: Mohamad, Nurita, et al.
Published: (2020)
Implementation of Identity Based Encryption in e-Voting System
by: Selamat, S. R., et al.
Published: (2007)
by: Selamat, S. R., et al.
Published: (2007)
A New Image-Database Encryption Based on A Hybrid Approach of Data-at-Rest and Data-in-Motion Encryption Protocol.
by: Ooi, Bee Sien, et al.
Published: (2004)
by: Ooi, Bee Sien, et al.
Published: (2004)
An improved timestamp-based password authentication scheme with two-party verification using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Efficient algorithms for the key representation auditing scheme.
by: Asim Abdallah, Elshiekh, et al.
Published: (2009)
by: Asim Abdallah, Elshiekh, et al.
Published: (2009)
On the key revocation schemes in wireless sensor networks
by: Mall, Dieynaba, et al.
Published: (2013)
by: Mall, Dieynaba, et al.
Published: (2013)
An efficient and provable secure identity-based identification scheme in the standard model
by: Ji-Jian, Chin, et al.
Published: (2008)
by: Ji-Jian, Chin, et al.
Published: (2008)
Message based random variable length key encryption algorithm.
by: Mirvaziri, Hamid, et al.
Published: (2009)
by: Mirvaziri, Hamid, et al.
Published: (2009)
Online signature verification based on dynamic feature discriminators
by: Omar, Nazaruddin
Published: (2009)
by: Omar, Nazaruddin
Published: (2009)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
MALAM ANEKARAGAM PKI 2016 - BERHIBUR SAMBIL
BERAMAL
by: MPRC, Pusat Media & Perhubungan Awam
Published: (2016)
by: MPRC, Pusat Media & Perhubungan Awam
Published: (2016)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004)
by: H. Belgassem, Seddeq
Published: (2004)
Selective video encryption algorithm based on H.264/AVC and AES
by: Omar zakaria, Mohamed Abomhara, et al.
Published: (2011)
by: Omar zakaria, Mohamed Abomhara, et al.
Published: (2011)
Similar Items
-
Integrating Identity-Based Encryption (Ibe) In The Return Routability Protocol (Rrp) To Enhance Signals Security
In Mobile Ipv6.
by: S. Alsayfi, Majed Salam
Published: (2010) -
Performance evaluation of identity-based encryption (IBE) remote attestation protocol in wireless sensor networks / Roszainiza Rosli
by: Rosli, Roszainiza
Published: (2014) -
Secure file sharing with public key infrastructure (PKI) enablement / Noor Azlina Ismail @ Hassan
by: Ismail @ Hassan, Noor Azlina
Published: (2015) -
Identity-based encryption schemes - a review
by: Tea, Boon Chian, et al.
Published: (2019) -
k-Resilient Identity-Based Encryption in the Standard Model
by: HENG, S.-H.
Published: (2006)