ID-based encryption

Results: 182



#Item
51» GROUP TEST l Email security There’s been a lot of convergence in email security and content management tools. Look for the granular differences, says Nathan Ouellette. T

» GROUP TEST l Email security There’s been a lot of convergence in email security and content management tools. Look for the granular differences, says Nathan Ouellette. T

Add to Reading List

Source URL: sendmail.com

Language: English - Date: 2010-03-17 20:00:10
52User-Level_S:MIME Encryption

User-Level_S:MIME Encryption

Add to Reading List

Source URL: sendmail.com

Language: English - Date: 2011-05-24 15:35:31
53Cryptography for Secure and Private Databases: Enabling Practical Data Access without Compromising Privacy by Matthew Daniel Green

Cryptography for Secure and Private Databases: Enabling Practical Data Access without Compromising Privacy by Matthew Daniel Green

Add to Reading List

Source URL: spar.isi.jhu.edu

Language: English - Date: 2010-02-27 17:25:11
54Ciphertext-Policy Attribute-Based Encryption

Ciphertext-Policy Attribute-Based Encryption

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:43:48
55Identity-Based Proxy Re-Encryption Matthew Green Giuseppe Ateniese  Information Security Institute

Identity-Based Proxy Re-Encryption Matthew Green Giuseppe Ateniese Information Security Institute

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-15 20:05:23
56An Improved ID-based Authenticated Group Key Agreement Schemes

An Improved ID-based Authenticated Group Key Agreement Schemes

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-12-18 02:47:20
57An extended abstract of this paper appears in Kaoru Kurosawa (Ed.): Advances in Cryptology ASIACRYPT 2007, volume 4833 of Lecture Notes in Computer Science, pages 265–282, Springer-Verlag, 2007. This is the full versio

An extended abstract of this paper appears in Kaoru Kurosawa (Ed.): Advances in Cryptology ASIACRYPT 2007, volume 4833 of Lecture Notes in Computer Science, pages 265–282, Springer-Verlag, 2007. This is the full versio

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-05-02 11:56:16
58An Improved Remote User Authentication Scheme using Bilinear Pairings Sunder Lala & K.K.Goyalb a Department of Mathematics, Institute of Basic Science, Dr.B.R.Ambedkar University, Khandari, AgraU.P)

An Improved Remote User Authentication Scheme using Bilinear Pairings Sunder Lala & K.K.Goyalb a Department of Mathematics, Institute of Basic Science, Dr.B.R.Ambedkar University, Khandari, AgraU.P)

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-11-26 05:40:58
59Is it possible to have CBE from CL-PKE? Bo Gyeong Kang?1 and Je Hong Park2 1 Department of Mathematics, Korea Advanced Institute of Science and Technology, 373-1 Guseong-dong, Yuseong-gu, Daejeon, , Korea

Is it possible to have CBE from CL-PKE? Bo Gyeong Kang?1 and Je Hong Park2 1 Department of Mathematics, Korea Advanced Institute of Science and Technology, 373-1 Guseong-dong, Yuseong-gu, Daejeon, , Korea

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-02-03 07:05:45
60Generic Constructions of Integrated PKE and PEKS Yu Chen∗ Jiang Zhang†  Dongdai Lin∗

Generic Constructions of Integrated PKE and PEKS Yu Chen∗ Jiang Zhang† Dongdai Lin∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-01 02:46:37