Identity-based cryptography

Results: 85



#Item
51ID-based encryption / ID-based cryptography / Key distribution / Public key infrastructure / Digital signature / Man-in-the-middle attack / Key / Cryptography / Key management / Public-key cryptography

An Identity-Based Key Infrastructure Suitable for Messaging and Its Application to E-mail ∗ Ay¸se Gül Karatop

Add to Reading List

Source URL: research.sabanciuniv.edu

Language: English - Date: 2008-11-07 06:20:13
52Geolocation / Electronic commerce / Identity management / Internet privacy / Location-based service / RSA / Privacy / User agent / Mobile phone tracking / Technology / Navigation / Public-key cryptography

1 Privacy-Preserving Location-based Services for Mobile Users in Wireless Networks Sheng Zhong∗ , Li (Erran) Li† , Yanbin Grace Liu‡ , Yang Richard Yang∗ ∗ Computer Science Department, Yale University, New Hav

Add to Reading List

Source URL: www.cs.yale.edu

Language: English - Date: 2006-04-11 09:16:01
53Computer security / Email authentication / Internet privacy / Email / Email encryption / Encryption software / Password / Encrypting File System / Email client / Computing / Cryptography / Cryptographic software

Voltage Encryption Overview Voltage Encryption provides an identity-based solution for inline encryption of email messages and attachments. A one-time identity registration allows users to read encrypted messages by simp

Add to Reading List

Source URL: www.sendmail.com

Language: English - Date: 2010-04-21 19:52:09
54EMC Corporation / Advanced Encryption Standard / SecurID / Two-factor authentication / Software token / Password / Access token / Identity management / Authentication / Cryptography / Security / Computer security

Token Based Authentication as a Fully Hosted Service Key benefits Reliable •

Add to Reading List

Source URL: www.signify.net

Language: English - Date: 2012-11-07 11:09:46
55Pairing / Boneh/Franklin scheme / Elliptic curve cryptography / Diffie–Hellman problem / Elliptic curve / ID-based encryption / Tate pairing / BLS / Supersingular elliptic curve / Cryptography / Abstract algebra / Algebra

An Introduction to Pairing-Based Cryptography Alfred Menezes Abstract. Bilinear pairings have been used to design ingenious protocols for such tasks as one-round three-party key agreement, identity-based encryption, and

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2013-10-27 06:53:30
56Computer network security / Knowledge-based authentication / Identity theft / Authentication / Identity document / Security / Cryptography / Identity

CONGRESS... EMPLOYERS NEED YOUR HELP TO STOP IDENTITY THEFT IN THE WORKPLACE E-VERIFY AUTHENTICATES THAT THE IDENTITY PRESENTED IS

Add to Reading List

Source URL: www.shrm.org

Language: English - Date: 2013-11-14 10:57:48
57Electronic commerce / Social issues / Privacy / Credential / Computer security / Digital signature / Internet privacy / Digital credential / Cryptography / Identity management / Public-key cryptography

Attribute-Based Credentials for Trust D3.1 Scientific Comparison of ABC Protocols Part I – Formal Treatment of Privacy-Enhancing Credential Systems

Add to Reading List

Source URL: abc4trust.eu

Language: English - Date: 2014-08-28 02:52:31
58Post-quantum cryptography / Standards organizations / Public-key cryptography / NTRU / ID-based encryption / Institute of Electrical and Electronics Engineers / Pairing / Cryptography / IEEE standards / IEEE P1363

IEEE P1363.3: Standard for Identity-Based Cryptographic Techniques using Pairings CALL FOR SUBMISSIONS Contributions are requested for the IEEE P1363.3 project, "Standard for Identity-Based Cryptographic Techniques usin

Add to Reading List

Source URL: grouper.ieee.org

Language: English - Date: 2008-04-27 09:53:33
59Electronic commerce / Identity management / Credential / SHA-2 / Proof of knowledge / Pseudorandom number generator / RSA / SHA-1 / Cryptography / Cryptographic hash functions / Cryptographic protocols

Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards⋆ Antonio de la Piedra, Jaap-Henk Hoepman, Pim Vullers Radboud University Nijmegen, ICIS DS, Nijmegen, The Netherlands {a.delapiedra,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-01 05:32:30
60Cyberwarfare / Computer security / Security / RSA / Email encryption / Boneh/Franklin scheme / Cryptography / Public-key cryptography / ID-based encryption

Identity Based Encryption Terence Spies VP Engineering [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
UPDATE