ID-based encryption

Results: 182



#Item
1EMBARGOED FOR RELEASE March 31, 12:01 a.m. ET Bruce Shriver ACMMarie Gentile

EMBARGOED FOR RELEASE March 31, 12:01 a.m. ET Bruce Shriver ACMMarie Gentile

Add to Reading List

Source URL: fellows.acm.org

Language: English - Date: 2015-03-30 17:41:07
2Reset Secure Identity-Based Identification Schemes without Pairing Ji-Jian Chin, Hiroaki Anada Syh-Yuan Tan Direction and Motivations  Cryptography: the art and science of concealing

Reset Secure Identity-Based Identification Schemes without Pairing Ji-Jian Chin, Hiroaki Anada Syh-Yuan Tan Direction and Motivations  Cryptography: the art and science of concealing

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-23 04:37:54
3ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-07-06 14:15:02
4ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-06-03 03:06:48
52015 IEEE Symposium on Security and Privacy  SoK: Secure Messaging1 ∗  Nik Unger∗ , Sergej Dechand†

2015 IEEE Symposium on Security and Privacy SoK: Secure Messaging1 ∗ Nik Unger∗ , Sergej Dechand†

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:43:11
6A Survey on Craptological Pairing Algorithms PauloS.//// LMBarreto Anonymized for submission

A Survey on Craptological Pairing Algorithms PauloS.//// LMBarreto Anonymized for submission

Add to Reading List

Source URL: www.anagram.com

Language: English - Date: 2010-11-11 14:43:35
72015 IEEE Symposium on Security and Privacy  Forward Secure Asynchronous Messaging from Puncturable Encryption Matthew D. Green and Ian Miers Department of Computer Science

2015 IEEE Symposium on Security and Privacy Forward Secure Asynchronous Messaging from Puncturable Encryption Matthew D. Green and Ian Miers Department of Computer Science

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:43:14
8ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-07-06 14:14:55
9Controlled Functional Encryption Muhammad Naveed1 , Shashank Agrawal1 , Manoj Prabhakaran1 , Xiaofeng Wang2 , Erman Ayday3 , Jean-Pierre Hubaux3 and Carl A. Gunter1 1  University of Illinois at Urbana-Champaign

Controlled Functional Encryption Muhammad Naveed1 , Shashank Agrawal1 , Manoj Prabhakaran1 , Xiaofeng Wang2 , Erman Ayday3 , Jean-Pierre Hubaux3 and Carl A. Gunter1 1 University of Illinois at Urbana-Champaign

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2014-08-27 22:14:05
10Instantiating the Dual System Encryption Methodology in Bilinear Groups Allison Lewko joint work with Brent Waters  Motivation

Instantiating the Dual System Encryption Methodology in Bilinear Groups Allison Lewko joint work with Brent Waters Motivation

Add to Reading List

Source URL: ecc2011.loria.fr

Language: English - Date: 2011-09-30 12:40:03