Al-karkhi et al., 2023 - Google Patents
A Secure Private Key Recovery Based on DNA Bio-Cryptography for BlockchainAl-karkhi et al., 2023
View PDF- Document ID
- 9519945809603346061
- Author
- Al-karkhi A
- Hassan N
- Azeez R
- Publication year
- Publication venue
- Iraqi Journal of Science
External Links
Snippet
The existence of the Internet, networking, and cloud computing support a wide range of new technologies. Blockchain is one of these technologies; this increases the interest of researchers who are concerned with providing a safe environment for the circulation of …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Liang et al. | A mutual security authentication method for RFID-PUF circuit based on deep learning | |
JP5499358B2 (en) | Authentication processing method and apparatus | |
CN110710155A (en) | Progressive key encryption algorithm | |
JP2001326632A (en) | Distributed group management system and method | |
EP3069249A2 (en) | Authenticatable device | |
Liu et al. | The security of blockchain-based medical systems: Research challenges and opportunities | |
Yilmaz et al. | ARMOR: An anti-counterfeit security mechanism for low cost radio frequency identification systems | |
Al-karkhi et al. | A Secure Private Key Recovery Based on DNA Bio-Cryptography for Blockchain | |
Gajmal et al. | Blockchain-based access control and data sharing mechanism in cloud decentralized storage system | |
US11856095B2 (en) | Apparatus and methods for validating user data by using cryptography | |
Panchal et al. | Designing secure and efficient biometric-based access mechanism for cloud services | |
US20240348592A1 (en) | Apparatus and method for managing credentials | |
Shen et al. | BMSE: Blockchain-based multi-keyword searchable encryption for electronic medical records | |
Habib et al. | A blockchain-based technique to prevent grade tampering: A university perspective | |
Goswami et al. | ZSS signature-based audit message verification process for cloud data integrity | |
Khalid et al. | Cloud server security using bio-cryptography | |
Xie et al. | Provably secure and lightweight blockchain based cross hospital authentication scheme for IoMT-based healthcare | |
Lyu et al. | NSSIA: A New Self‐Sovereign Identity Scheme with Accountability | |
Resende et al. | PUF-based mutual multifactor entity and transaction authentication for secure banking | |
Singamaneni et al. | [Retracted] An Enhanced Dynamic Nonlinear Polynomial Integrity‐Based QHCP‐ABE Framework for Big Data Privacy and Security | |
Kirkpatrick et al. | Enforcing physically restricted access control for remote data | |
CN112631552A (en) | Random number generation and regeneration method based on non-uniform random source and electronic device | |
Dharminder et al. | Construction of lightweight authentication scheme for network applicants using smart cards | |
CN111355588A (en) | Wearable device double-factor authentication method and system based on PUF and fingerprint characteristics | |
Asmitha et al. | Decentralized User Wallet: Transforming Digital Banking with Blockchain |