Identity-based cryptography

Results: 85



#Item
31Voltage Encryption Overview Voltage Encryption provides an identity-based solution for inline encryption of email messages and attachments. A one-time identity registration allows users to read encrypted messages by simp

Voltage Encryption Overview Voltage Encryption provides an identity-based solution for inline encryption of email messages and attachments. A one-time identity registration allows users to read encrypted messages by simp

Add to Reading List

Source URL: sendmail.com

Language: English - Date: 2010-04-21 19:52:09
32Voltage Encryption Overview Voltage Encryption provides an identity-based solution for inline encryption of email messages and attachments. A one-time identity registration allows users to read encrypted messages by simp

Voltage Encryption Overview Voltage Encryption provides an identity-based solution for inline encryption of email messages and attachments. A one-time identity registration allows users to read encrypted messages by simp

Add to Reading List

Source URL: www.sendmail.com

Language: English - Date: 2010-04-21 19:52:09
33Unifying IP Communication  Secure Profile Management Enterprise Security and Identity Management for IP-based Systems LiteScape Secure Profile Management™ unifies an organization’s identity management systems with IP

Unifying IP Communication Secure Profile Management Enterprise Security and Identity Management for IP-based Systems LiteScape Secure Profile Management™ unifies an organization’s identity management systems with IP

Add to Reading List

Source URL: www.litescape.com

Language: English - Date: 2011-09-08 18:03:53
34Federated Browser-Based Identity using Email Addresses Mike Hanson Dan Mills  Ben Adida

Federated Browser-Based Identity using Email Addresses Mike Hanson Dan Mills Ben Adida

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2011-05-12 17:26:02
35Identity-Based Proxy Re-Encryption Matthew Green Giuseppe Ateniese  Information Security Institute

Identity-Based Proxy Re-Encryption Matthew Green Giuseppe Ateniese Information Security Institute

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-15 20:05:23
36On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups Kenneth G. Paterson and Sriramkrishnan Srinivasan Information Security Group, Royal Holloway, Universi

On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups Kenneth G. Paterson and Sriramkrishnan Srinivasan Information Security Group, Royal Holloway, Universi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-10-12 12:17:42
37TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks Leonardo B. Oliveira UNICAMP, Brazil

TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks Leonardo B. Oliveira UNICAMP, Brazil

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-01-07 17:26:25
38New Constructions of Revocable Identity-Based Encryption from Multilinear Maps Seunghwan Park∗ Kwangsu Lee†

New Constructions of Revocable Identity-Based Encryption from Multilinear Maps Seunghwan Park∗ Kwangsu Lee†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-01 20:30:36
39Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures S. Sharmila Deva Selvi, S. Sree Vivek! , C. Pandu Rangan! Theoretical Computer Science Laboratory, Department of Computer Science

Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures S. Sharmila Deva Selvi, S. Sree Vivek! , C. Pandu Rangan! Theoretical Computer Science Laboratory, Department of Computer Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-21 04:48:54
40Enhancing CK-Model for Key Compromise Impersonation Resilience and Identity-based Key Exchange Robert W. Zhu, Xiaojian Tian, and Duncan S. Wong Department of Computer Science City University of Hong Kong

Enhancing CK-Model for Key Compromise Impersonation Resilience and Identity-based Key Exchange Robert W. Zhu, Xiaojian Tian, and Duncan S. Wong Department of Computer Science City University of Hong Kong

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-06-13 00:19:02