scispace - formally typeset
T

Tom Dowling

Researcher at Maynooth University

Publications -  18
Citations -  220

Tom Dowling is an academic researcher from Maynooth University. The author has contributed to research in topics: Encryption & Java. The author has an hindex of 10, co-authored 18 publications receiving 218 citations.

Papers
More filters
Journal ArticleDOI

A Biometric Identity Based Signature Scheme

TL;DR: In this article, an identity-based signature scheme that uses biometric information to construct the public key was proposed, which would be beneficial in many repudiation situations for example a legal dispute over whether a contract had been signed or not by a user.
Proceedings ArticleDOI

An Identity Based Encryption system

TL;DR: A Java Cryptographic Architecture (JCA) integrated implementation of IBE that will allow Java developers to easily take advantage of this new encryption system and thus eliminate some of the most serious practical problems associated with existing public key infrastructure systems.
Book ChapterDOI

Secure and Efficient Group Key Agreements for Cluster Based Networks

TL;DR: Two dynamically efficient authenticated group key agreement protocols by reflecting ad hoc networks in a topology composed by a set of clusters are presented, allowing easy addition and removal of nodes, and achieving better performance in comparison with the existing cluster based key agreements.
Proceedings ArticleDOI

Key management in multi-distributor based DRM system with mobile clients using IBE

TL;DR: This work proposes a key management scheme for a DRM system that involves more than one distributors with the DRM client's flexibility of choosing a distributor according to his own preference, which makes the DRM system suitable for more effective business models/applications with the flexibility in deciding a wide range of business strategies as compared to the existing works.
Book ChapterDOI

Enhanced Access Polynomial Based Self-healing Key Distribution

TL;DR: This work enhances the one-way key chain based self-healing key distribution of Dutta et al. by introducing a collusion resistance property between the revoked users and the newly joined users, and proposes a scheme based on the concept of access polynomials that allows temporary revocation.