[go: up one dir, main page]

Al-karkhi et al., 2023 - Google Patents

A Secure Private Key Recovery Based on DNA Bio-Cryptography for Blockchain

Al-karkhi et al., 2023

View PDF
Document ID
9519945809603346061
Author
Al-karkhi A
Hassan N
Azeez R
Publication year
Publication venue
Iraqi Journal of Science

External Links

Snippet

The existence of the Internet, networking, and cloud computing support a wide range of new technologies. Blockchain is one of these technologies; this increases the interest of researchers who are concerned with providing a safe environment for the circulation of …
Continue reading at ijs.uobaghdad.edu.iq (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Similar Documents

Publication Publication Date Title
Liang et al. A mutual security authentication method for RFID-PUF circuit based on deep learning
JP5499358B2 (en) Authentication processing method and apparatus
CN110710155A (en) Progressive key encryption algorithm
JP2001326632A (en) Distributed group management system and method
EP3069249A2 (en) Authenticatable device
Liu et al. The security of blockchain-based medical systems: Research challenges and opportunities
Yilmaz et al. ARMOR: An anti-counterfeit security mechanism for low cost radio frequency identification systems
Al-karkhi et al. A Secure Private Key Recovery Based on DNA Bio-Cryptography for Blockchain
Gajmal et al. Blockchain-based access control and data sharing mechanism in cloud decentralized storage system
US11856095B2 (en) Apparatus and methods for validating user data by using cryptography
Panchal et al. Designing secure and efficient biometric-based access mechanism for cloud services
US20240348592A1 (en) Apparatus and method for managing credentials
Shen et al. BMSE: Blockchain-based multi-keyword searchable encryption for electronic medical records
Habib et al. A blockchain-based technique to prevent grade tampering: A university perspective
Goswami et al. ZSS signature-based audit message verification process for cloud data integrity
Khalid et al. Cloud server security using bio-cryptography
Xie et al. Provably secure and lightweight blockchain based cross hospital authentication scheme for IoMT-based healthcare
Lyu et al. NSSIA: A New Self‐Sovereign Identity Scheme with Accountability
Resende et al. PUF-based mutual multifactor entity and transaction authentication for secure banking
Singamaneni et al. [Retracted] An Enhanced Dynamic Nonlinear Polynomial Integrity‐Based QHCP‐ABE Framework for Big Data Privacy and Security
Kirkpatrick et al. Enforcing physically restricted access control for remote data
CN112631552A (en) Random number generation and regeneration method based on non-uniform random source and electronic device
Dharminder et al. Construction of lightweight authentication scheme for network applicants using smart cards
CN111355588A (en) Wearable device double-factor authentication method and system based on PUF and fingerprint characteristics
Asmitha et al. Decentralized User Wallet: Transforming Digital Banking with Blockchain