Identity-based cryptography

Results: 85



#Item
11ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-07-06 14:14:55
12Instantiating the Dual System Encryption Methodology in Bilinear Groups Allison Lewko joint work with Brent Waters  Motivation

Instantiating the Dual System Encryption Methodology in Bilinear Groups Allison Lewko joint work with Brent Waters Motivation

Add to Reading List

Source URL: ecc2011.loria.fr

Language: English - Date: 2011-09-30 12:40:03
13In C.-M. Cheng et al., Eds., Public Key Cryptography − PKC 2016, Part I, volof Lecture Notes in Computer Science, pp, Springer, 2016. Identity-Based Cryptosystems and Quadratic Residuosity Marc Joye

In C.-M. Cheng et al., Eds., Public Key Cryptography − PKC 2016, Part I, volof Lecture Notes in Computer Science, pp, Springer, 2016. Identity-Based Cryptosystems and Quadratic Residuosity Marc Joye

Add to Reading List

Source URL: joye.site88.net

Language: English - Date: 2016-02-23 20:14:59
    14Breaking Four Mix-related Schemes Based on Universal Re-encryption George Danezis K.U. Leuven, ESAT/COSIC, Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium.

    Breaking Four Mix-related Schemes Based on Universal Re-encryption George Danezis K.U. Leuven, ESAT/COSIC, Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium.

    Add to Reading List

    Source URL: www0.cs.ucl.ac.uk

    Language: English - Date: 2013-10-10 06:49:00
    15Interest-Based Access Control in CCN Cesar Ghali, Marc A. Schlosberg, Gene Tsudik, Christopher A. Wood Department of Computer Science University of California Irvine

    Interest-Based Access Control in CCN Cesar Ghali, Marc A. Schlosberg, Gene Tsudik, Christopher A. Wood Department of Computer Science University of California Irvine

    Add to Reading List

    Source URL: conferences2.sigcomm.org

    Language: English - Date: 2015-10-03 12:09:18
    16Moderator-controlled Information Sharing by Identity-based Aggregate Signatures for Information Centric Networking Tohru Asami  The University of Tokyo

    Moderator-controlled Information Sharing by Identity-based Aggregate Signatures for Information Centric Networking Tohru Asami The University of Tokyo

    Add to Reading List

    Source URL: conferences2.sigcomm.org

    Language: English - Date: 2015-10-01 13:18:49
    17Identity-based Cryptography for Securing Mobile Phone Calls ¨ Agel, Bernd Freisleben Matthew Smith, Christian Schridde, Bjorn Department of Mathematics and Computer Science, University of Marburg Hans-Meerwein-Str. 3, D

    Identity-based Cryptography for Securing Mobile Phone Calls ¨ Agel, Bernd Freisleben Matthew Smith, Christian Schridde, Bjorn Department of Mathematics and Computer Science, University of Marburg Hans-Meerwein-Str. 3, D

    Add to Reading List

    Source URL: www.dcsec.uni-hannover.de

    Language: English - Date: 2010-11-03 12:17:51
      18Boneh-Franklin Identity Based Encryption Revisited David Galindo Institute for Computing and Information Sciences Radboud University Nijmegen P.O.BoxGL, Nijmegen, The Netherlands.

      Boneh-Franklin Identity Based Encryption Revisited David Galindo Institute for Computing and Information Sciences Radboud University Nijmegen P.O.BoxGL, Nijmegen, The Netherlands.

      Add to Reading List

      Source URL: www.dgalindo.es

      Language: English - Date: 2007-11-26 10:35:37
      19Securing Mobile Phone Calls with Identity-Based Cryptography ¨ Agel, Bernd Freisleben Matthew Smith, Christian Schridde, Bjorn Department of Mathematics and Computer Science, University of Marburg Hans-Meerwein-Str. 3,

      Securing Mobile Phone Calls with Identity-Based Cryptography ¨ Agel, Bernd Freisleben Matthew Smith, Christian Schridde, Bjorn Department of Mathematics and Computer Science, University of Marburg Hans-Meerwein-Str. 3,

      Add to Reading List

      Source URL: www.dcsec.uni-hannover.de

      Language: English - Date: 2010-11-03 12:17:51
        20Provably Secure Timed-Release Public Key Encryption JUNG HEE CHEON Seoul National University, Korea and NICHOLAS HOPPER, YONGDAE KIM and IVAN OSIPKOV

        Provably Secure Timed-Release Public Key Encryption JUNG HEE CHEON Seoul National University, Korea and NICHOLAS HOPPER, YONGDAE KIM and IVAN OSIPKOV

        Add to Reading List

        Source URL: www-users.cs.umn.edu

        Language: English - Date: 2009-03-17 15:01:03