Certificate-based encryption

Results: 17



#Item
1Public-key cryptography / E-commerce / Key management / Public key infrastructure / Secure communication / Cryptographic primitive / ID-based encryption / Cryptography / Cryptographic protocol / Zero-knowledge proof / Public key certificate / Digital signature

ESORICS 2015 Program Guide ESORICS only 21 – 25 September 2015 Vienna, Austria www.esorics2015.sba-research.org

Add to Reading List

Source URL: esorics2015.sba-research.org

Language: English - Date: 2015-09-22 04:03:47
2Kerberos / Key / Certificate authority / Symmetric-key algorithm / ID-based encryption / Cryptographic key types / Cryptography / Key management / Public-key cryptography

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:13
3Key management / Finite fields / ID-based encryption / Group signature / XTR / RSA / Digital signature / Public key certificate / Cryptography / Public-key cryptography / Electronic commerce

An Improved ID-based Authenticated Group Key Agreement Schemes

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-12-18 02:47:20
4ID-based encryption / Advantage / Certificate-based encryption / Ciphertext / Standard model / ID-based cryptography / RSA / Cipher / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Electronic commerce

Lecture Notes in Computer Science:

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-04 06:00:47
5Certificate-based encryption / Advantage / Cipher / RSA / ID-based encryption / Chosen-ciphertext attack / Cryptography / Public-key cryptography / Electronic commerce

Microsoft Word - Certificate-Based Encryption Resilient to Key Leakage.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-06 23:12:57
6Digital signature / Public key certificate / Certificate authority / Non-repudiation / Public key infrastructure / Revocation list / S/MIME / ID-based encryption / Cryptography / Public-key cryptography / Key management

Information Security Animations - Public Key Infrastructure (Script) Public Key Infrastructure Public Key Infrastructure (PKI) provides a safe and reliable environment for electronic transactions on

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2011-08-31 06:18:36
7Digital signature / Public key certificate / Certificate authority / Non-repudiation / Public key infrastructure / Revocation list / S/MIME / ID-based encryption / Cryptography / Public-key cryptography / Key management

Information Security Animations - Public Key Infrastructure (Script) Public Key Infrastructure Public Key Infrastructure (PKI) provides a safe and reliable environment for electronic transactions on

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2011-08-31 06:18:10
8Cryptographic protocols / Electronic commerce / ID-based encryption / Transport Layer Security / Certificate authority / Cipher / Key / Public key certificate / Certificate server / Cryptography / Public-key cryptography / Key management

Using Identity-Based Encryption to Eliminate Certificates in SSL Transactions

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2002-07-18 00:26:34
9X.509 / ID-based encryption / Public key infrastructure / Authentication server / Revocation list / Certificate authority / Kerberos / Public key certificate / Authentication / Cryptography / Public-key cryptography / Key management

A Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication∗ Jason Crampton, Hoon Wei Lim, Kenneth G. Paterson, and Geraint Price Information Security Group Royal Holloway, University

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2007-04-13 09:22:49
10Electronic commerce / ID-based encryption / ID-based cryptography / Clifford Cocks / Key / RSA / Public key infrastructure / Boneh/Franklin scheme / Certificate-based encryption / Cryptography / Key management / Public-key cryptography

Identity-Based Encryption with Conventional Public-Key Cryptography

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2005-02-23 11:34:53
UPDATE