Guest Editors' Introduction: Artificial Intelligence for Homeland Security
IEEE Intelligent Systems
Rule + Exception Strategies for Security Information Analysis
IEEE Intelligent Systems
Fuzzy identity-based encryption
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
IEEE Transactions on Intelligent Transportation Systems
Hi-index | 0.00 |
Computer networks have evolved from close local networks to open interconnected networks and the operations from data communication to online transaction. As such, identity authentication is indispensable in today's computing platform. Current identity authentication techniques primarily focus on Public Key Infrastructure (PKI) or Identity Based Encryption (IBE). However, these techniques authenticate users' identity relying on tokens or keys and one or many trustworthy third-party(s) that require databases running online, with multiple points of vulnerability and low efficiency.