Identity-based cryptography

Results: 85



#Item
21Access control / Authentication / Notary / Packaging / Password / OpenID / Risk-based authentication / Shibboleth / Athens / Security / Cryptography / Federated identity

Poster: Authentication by web browsing history Chisa Kuroda, Mizuki Kobayashi, Mioko Watanaze, and Manabu Okamoto Kanagawa Institute of Technology Shimo-ogino 1030, Atsugi-shi Kanagawa, Japan

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:19
22Cryptographic protocols / Electronic commerce / X.509 / Transport Layer Security / ID-based cryptography / ID-based encryption / Public key infrastructure / Grid Security Infrastructure / Digital signature / Cryptography / Key management / Public-key cryptography

Identity-Based Cryptography for Grid Security Hoon Wei Lim and Kenneth G. Paterson Information Security Group Royal Holloway, University of London Egham, Surrey TW20 0EX, UK {h.lim, kenny.paterson}@rhul.ac.uk

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-09-30 07:23:50
23ID-based cryptography / Cyberwarfare / Security / Key management / Boneh/Franklin scheme / Applied mathematics / Cryptography / ID-based encryption / Public-key cryptography

Verifiable Security of Boneh-Franklin Identity-Based Encryption Federico Olmedo Gilles Barthe Santiago Zanella Béguelin IMDEA Software Institute, Madrid, Spain

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36
24Intel Core / Cryptography / Boneh/Franklin scheme / ID-based encryption

Verifiable Security of Boneh-Franklin Identity-Based Encryption⋆ Gilles Barthe, Federico Olmedo, and Santiago Zanella B´eguelin {Gilles.Barthe,Federico.Olmedo,Santiago.Zanella}@imdea.org IMDEA Software Institute, Madr

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
25Intel Core / Cryptography / Boneh/Franklin scheme / ID-based encryption

Verifiable Security of Boneh-Franklin Identity-Based Encryption⋆ Gilles Barthe, Federico Olmedo, and Santiago Zanella B´eguelin {Gilles.Barthe,Federico.Olmedo,Santiago.Zanella}@imdea.org IMDEA Software Institute, Madr

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36
26Cryptography / Password / Identity management / Computer network security / Password synchronization / Password manager / Security / Access control / Computer security

Measuring the Security Impacts of Password Policies Using Cognitive Behavioral Agent-Based Modeling Vijay Kothari Jim Blythe

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2015-03-16 15:34:51
27Security / Broad-Based Black Economic Empowerment / Email / Certified copy / Identity document / Meter Point Administration Number / Public key certificate / Cryptography / Economy of South Africa / Civil law

SUPPLIER DATABASE REGISTRATION NAME OF SERVICE PROVIDER: ______________________________________ FOR OFFICIAL PURPOSES:

Add to Reading List

Source URL: www.geoscience.org.za

Language: English - Date: 2015-05-06 18:53:08
28Lion-reclining / Hand / Vulture / Stool-or-mat / Quail chick / Foot / Jar stand / Viper / Cryptography / Egyptian hieroglyphs / Cryptographic protocols / XTR

Weakness of Several Identity-based Tripartite Authenticated Key Agreement Protocols Xi-Jun Lin ∗and Lin Sun †

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-15 08:56:00
29Designated verifier signature / Parity of a permutation / RSA / Signature / Diffie–Hellman key exchange / Cryptography / Public-key cryptography / Digital signature

Microsoft Word - A new identity-based strong designated verifier signature scheme1115.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-01 03:09:27
30Computer security / Constraint programming / Datalog / Cryptography / Role-based access control / Credential / Digital credential / Trust negotiation / Constraint logic programming / Security / Identity management / Access control

RT : A Role-based Trust-management Framework∗ Ninghui Li John C. Mitchell Department of Computer Science, Stanford University Gates 4B, Stanford, CA {ninghui.li, mitchell}@cs.stanford.edu

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2003-11-04 15:32:03
UPDATE