Learn More
Most of the certificateless two-party authenticated key agreement protocols (CTAKA) found in the literature, suffer either serious security problems making them vulnerable to types of attacks or inefficient performance that involves high computational costs. In this paper, we design an secure and efficient CTAKA. Within the proposed scheme, the KGC(More)
The main purpose of this paper is to provide a security proof for the certificateless digital signature scheme found in [Hassouna, Bashier, and Barry, A short certificateless digital signature scheme, International Conference of Digital Information Processing, Data Mining and Wireless Communications, 2015, pp. 120–127] in the random oracle model. Two types(More)
Most of the existing mailing systems provide limited authentication mechanisms, including web trust model, password authentication or identity based cryptography. Few existing mailing systems found in the literature provide strong authentication based on public key infrastructure (PKI). However, PKI based-systems generally suffer from certificate management(More)
OBJECTIVES Surgical treatment of a congenital bladder diverticulum is indicated in symptomatic children. Diverticulectomy can be performed by an open or a laparoscopic approach. We report our recent experience in using the pneumovesicoscopic approach for accomplishing vesical diverticulectomy. METHODS We operated on three boys with a mean age of 11.6(More)
This paper extends the certificateless public key infrastructure model that was proposed by Hassouna et al by proposing new digital signature scheme to provide true non-repudiation, the proposed signature scheme is short and efficient, it is also has strength point that the KGC has no contribution in signature generation/verification process, therefore any(More)
Providing the security services (authenticity, integrity, confidentiality and non-repudiation) all together in mobile banking has remained a problematic issue for both banks and their customers. Both the public key infrastructure (PKI) and the identity-based public key cryptography (IB-PKC) which have been thought to provide solutions to these security(More)
Despite the fact that the traditional public key infrastructure provides Level 3 trusted authority, but its two major problems of scalability and certificate management raised the need to an alternative security infrastructure. That motivated the appearance of new technologies to replace the traditional PKI, such as the Identity based encryp-tion, the(More)
The high increase in the number of companies competing in mature markets makes customer retention an important factor for any company to survive. Thus, many methodologies (e.g., data mining and statistics) have been proposed to analyse and study customer retention. The validity of such methods is not yet proved though. This paper tries to fill this gap by(More)
The Arab Republic of Egypt has used family planning service delivery as the main vehicle for implementing its national family planning policy since 1965. This paper reports results of a study undertaken during 1975-77 using a systematic sample of 100 health units offering family planning services in two governorates of Egypt. The findings suggest that there(More)
  • 1