T
Tom Dowling
Researcher at Maynooth University
Publications - 18
Citations - 220
Tom Dowling is an academic researcher from Maynooth University. The author has contributed to research in topics: Encryption & Java. The author has an hindex of 10, co-authored 18 publications receiving 218 citations.
Papers
More filters
Journal ArticleDOI
A Biometric Identity Based Signature Scheme
TL;DR: In this article, an identity-based signature scheme that uses biometric information to construct the public key was proposed, which would be beneficial in many repudiation situations for example a legal dispute over whether a contract had been signed or not by a user.
Proceedings ArticleDOI
An Identity Based Encryption system
TL;DR: A Java Cryptographic Architecture (JCA) integrated implementation of IBE that will allow Java developers to easily take advantage of this new encryption system and thus eliminate some of the most serious practical problems associated with existing public key infrastructure systems.
Book ChapterDOI
Secure and Efficient Group Key Agreements for Cluster Based Networks
Ratna Dutta,Tom Dowling +1 more
TL;DR: Two dynamically efficient authenticated group key agreement protocols by reflecting ad hoc networks in a topology composed by a set of clusters are presented, allowing easy addition and removal of nodes, and achieving better performance in comparison with the existing cluster based key agreements.
Proceedings ArticleDOI
Key management in multi-distributor based DRM system with mobile clients using IBE
TL;DR: This work proposes a key management scheme for a DRM system that involves more than one distributors with the DRM client's flexibility of choosing a distributor according to his own preference, which makes the DRM system suitable for more effective business models/applications with the flexibility in deciding a wide range of business strategies as compared to the existing works.
Book ChapterDOI
Enhanced Access Polynomial Based Self-healing Key Distribution
TL;DR: This work enhances the one-way key chain based self-healing key distribution of Dutta et al. by introducing a collusion resistance property between the revoked users and the newly joined users, and proposes a scheme based on the concept of access polynomials that allows temporary revocation.