Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,284,348 papers from all fields of science
Search
Sign In
Create Free Account
Identity-based security
Known as:
Identity Based Security
Identity-based security is a patented network security approach, put forward by Cyberoam which includes security components that provides visibility…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
Access control
Authentication
Computer security policy
Encryption
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
IDSP: A New Identity-Based Security Protocol for Cluster-Based Wireless Sensor Networks
F. Mezrag
,
S. Bitam
,
A. Mellouk
IEEE International Symposium on Personal, Indoor…
2019
Corpus ID: 208206682
Communication security in Cluster-Based Wireless Sensor Network (CWSN) is considered as a challenging task facing this type of…
Expand
Review
2019
Review
2019
Identity Based Security Auditingfor Data Sharing with Sensitive Information Hiding using Cloud Storage
N. Bhuvaneswari
,
M. TrinathBasu
,
M. Srisathvik
,
R. Tenali
2019
Corpus ID: 212526285
Abstract: A privacy-preserving public auditing mechanism is used in the cloud for data sharing in the cloud storage. To utilize…
Expand
2018
2018
Identity-Based Security Scheme in Internet of Vehicles
Rakshanda Agarwal
,
S. Pranay
,
K. Rachana
,
H. P. Sultana
Smart Intelligent Computing and Applications
2018
Corpus ID: 88482693
There has been a rapid growth in the number of vehicles on road, and this makes it vital to establish communication between the…
Expand
Review
2015
Review
2015
Identity based signcryption for advanced metering infrastructure
Elif Ustundag Soykan
,
Seda Demirag Ersoz
,
Gurkan Soykan
3rd International Istanbul Smart Grid Congress…
2015
Corpus ID: 21004969
In smart grid, Advanced Metering Infrastructure (AMI) system provides measuring, storing, analyzing, and utilizing energy…
Expand
2014
2014
A Novel Identity-Based Security Scheme for Wireless Sensor Networks
Zhongyuan Qin
,
Kerong Feng
,
+4 authors
Jie Huang
Tenth International Conference on Computational…
2014
Corpus ID: 17724681
In wireless sensor networks (WSNs), massive amounts of nodes, volatile network topology and limited resources (such as energy…
Expand
2014
2014
An Efficient ID Based Security Algorithm for Mutual Node Authentication and Key Management: An Elliptic Curve Cryptography Based Approach
Nilanjan Sen
International Conference on Applied Algorithms
2014
Corpus ID: 14450335
The biggest challenge in the field of networking is the secured communication between the nodes within the network system…
Expand
2013
2013
Identity-based security systems for vehicular ad-hoc networks
G. Baldini
,
Vincent Mahieu
,
I. N. Fovino
,
Alberto Trombetta
,
Marco Taddeo
International Conference on Connected Vehicles…
2013
Corpus ID: 34289059
Cooperative Intelligent Transport Systems (ITS) based on vehicular car to car ad-hoc networks have been extensively investigated…
Expand
2010
2010
An identity-based security mechanism for P2P VoIP
Hua Jiang
,
Xianru Du
,
Yongxing Jia
,
Weizhi Wang
IEEE International Conference on Wireless…
2010
Corpus ID: 7634373
According to P2P VoIP signaling protocol security and its distributed features, an authenticated key agreement scheme is proposed…
Expand
2008
2008
Building identity-based security associations for provider-provisioned virtual private networks
K. Masmoudi
,
H. Afifi
Telecommunications Systems
2008
Corpus ID: 31731549
Provider-provisioned virtual private networks are nowadays well-established networking concepts. They are envisaged as an…
Expand
2003
2003
Server based application level authorisation for Rotor
E. Rissanen
IEE Proceedings - Software
2003
Corpus ID: 14415631
Delegent is an authorisation server developed to provide a single centralised policy repository for multiple applications with…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE