Identity-based cryptography

Results: 85



#Item
51An Identity-Based Key Infrastructure Suitable for Messaging and Its Application to E-mail ∗ Ay¸se Gül Karatop

An Identity-Based Key Infrastructure Suitable for Messaging and Its Application to E-mail ∗ Ay¸se Gül Karatop

Add to Reading List

Source URL: research.sabanciuniv.edu

Language: English - Date: 2008-11-07 06:20:13
521  Privacy-Preserving Location-based Services for Mobile Users in Wireless Networks Sheng Zhong∗ , Li (Erran) Li† , Yanbin Grace Liu‡ , Yang Richard Yang∗ ∗ Computer Science Department, Yale University, New Hav

1 Privacy-Preserving Location-based Services for Mobile Users in Wireless Networks Sheng Zhong∗ , Li (Erran) Li† , Yanbin Grace Liu‡ , Yang Richard Yang∗ ∗ Computer Science Department, Yale University, New Hav

Add to Reading List

Source URL: www.cs.yale.edu

Language: English - Date: 2006-04-11 09:16:01
53Voltage Encryption Overview Voltage Encryption provides an identity-based solution for inline encryption of email messages and attachments. A one-time identity registration allows users to read encrypted messages by simp

Voltage Encryption Overview Voltage Encryption provides an identity-based solution for inline encryption of email messages and attachments. A one-time identity registration allows users to read encrypted messages by simp

Add to Reading List

Source URL: www.sendmail.com

Language: English - Date: 2010-04-21 19:52:09
54Token Based Authentication as a Fully Hosted Service Key benefits Reliable •

Token Based Authentication as a Fully Hosted Service Key benefits Reliable •

Add to Reading List

Source URL: www.signify.net

Language: English - Date: 2012-11-07 11:09:46
55An Introduction to Pairing-Based Cryptography Alfred Menezes Abstract. Bilinear pairings have been used to design ingenious protocols for such tasks as one-round three-party key agreement, identity-based encryption, and

An Introduction to Pairing-Based Cryptography Alfred Menezes Abstract. Bilinear pairings have been used to design ingenious protocols for such tasks as one-round three-party key agreement, identity-based encryption, and

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2013-10-27 06:53:30
56CONGRESS...  EMPLOYERS NEED YOUR HELP TO STOP IDENTITY THEFT IN THE WORKPLACE E-VERIFY AUTHENTICATES THAT THE IDENTITY PRESENTED IS

CONGRESS... EMPLOYERS NEED YOUR HELP TO STOP IDENTITY THEFT IN THE WORKPLACE E-VERIFY AUTHENTICATES THAT THE IDENTITY PRESENTED IS

Add to Reading List

Source URL: www.shrm.org

Language: English - Date: 2013-11-14 10:57:48
57Attribute-Based Credentials for Trust  D3.1 Scientific Comparison of ABC Protocols Part I – Formal Treatment of Privacy-Enhancing Credential Systems

Attribute-Based Credentials for Trust D3.1 Scientific Comparison of ABC Protocols Part I – Formal Treatment of Privacy-Enhancing Credential Systems

Add to Reading List

Source URL: abc4trust.eu

Language: English - Date: 2014-08-28 02:52:31
58Post-quantum cryptography / Standards organizations / Public-key cryptography / NTRU / ID-based encryption / Institute of Electrical and Electronics Engineers / Pairing / Cryptography / IEEE standards / IEEE P1363

IEEE P1363.3: Standard for Identity-Based Cryptographic Techniques using Pairings CALL FOR SUBMISSIONS Contributions are requested for the IEEE P1363.3 project, "Standard for Identity-Based Cryptographic Techniques usin

Add to Reading List

Source URL: grouper.ieee.org

Language: English - Date: 2008-04-27 09:53:33
59Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards⋆ Antonio de la Piedra, Jaap-Henk Hoepman, Pim Vullers Radboud University Nijmegen, ICIS DS, Nijmegen, The Netherlands {a.delapiedra,

Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards⋆ Antonio de la Piedra, Jaap-Henk Hoepman, Pim Vullers Radboud University Nijmegen, ICIS DS, Nijmegen, The Netherlands {a.delapiedra,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-01 05:32:30
60Identity Based Encryption  Terence Spies VP Engineering [removed]

Identity Based Encryption Terence Spies VP Engineering [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00