2018
DOI: 10.14299/ijser.2018.10.05
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of asymmetric cryptography in information security based on computational study to ensure confidentiality during information exchange

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…The most significant studies related to this research. The authors in [3] have suggested a new approach for generating digital signatures utilizing biometrics, named biometric signatures, and presented two methods for creating biometric signatures employing RSA and DSA. The work describes in detail the changes suggested in private key generation utilizing both approaches to facilitate certificate renewal.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The most significant studies related to this research. The authors in [3] have suggested a new approach for generating digital signatures utilizing biometrics, named biometric signatures, and presented two methods for creating biometric signatures employing RSA and DSA. The work describes in detail the changes suggested in private key generation utilizing both approaches to facilitate certificate renewal.…”
Section: Related Workmentioning
confidence: 99%
“…4. Design a new method to generate digital signatures using biometrics (iris template) and has been denominated as Biometric Signature [3].…”
mentioning
confidence: 99%
“…Numerous sensor nodes are utilised in a wireless network to communicate, compute, and sense between base station and each sensor. (1) Environmental monitoring, traffic monitoring, building structure monitoring, military intelligence gathering and sensing, wildfire detection, habitat monitoring, pollution monitoring, and other domains are among the many areas in which WSN are applicable. (2) A wireless sensor is a node equipped with sensors, transceivers, computers, and power.…”
Section: Introductionmentioning
confidence: 99%
“…Diffie, Hellman, and Merkle introduced asymmetric cryptography in 1976 [10]. In asymmetric cryptography, there are two keys: a public key for encryption and a private key for decryption, according to [11]. The public key may be used by anybody to encrypt data; however, the private key can only be used by the authorized individual to decode the data.…”
Section: Introductionmentioning
confidence: 99%