First Page | Document Content | |
---|---|---|
![]() Date: 2012-01-19 01:27:31ID-based encryption ID-based cryptography Certificate-based encryption Digital signature Key Diffie–Hellman key exchange Public key infrastructure Certificateless cryptography Cryptography Key management Public-key cryptography | Source URL: crpit.comDownload Document from Source WebsiteFile Size: 151,61 KBShare Document on Facebook |
![]() | ESORICS 2015 Program Guide ESORICS only 21 – 25 September 2015 Vienna, Austria www.esorics2015.sba-research.orgDocID: 1kwGr - View Document |
![]() | This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followiDocID: 19fDT - View Document |
![]() | An Improved ID-based Authenticated Group Key Agreement SchemesDocID: 13lXc - View Document |
![]() | Lecture Notes in Computer Science:DocID: 12OA3 - View Document |
![]() | Microsoft Word - Certificate-Based Encryption Resilient to Key Leakage.docDocID: 11RlP - View Document |