Identity-based cryptography

Results: 85



#Item
61Public-key cryptography / Federated identity / Computing / Internet standards / Security Assertion Markup Language / Shibboleth / X.509 / Public key certificate / SAML-based products and services / Identity management / Computer security / System software

Shibboleth, SAML, and PK(I/i) Scott Cantor ([removed]) Internet2/MACE, The Ohio State University April 29, 2003 Overview

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2003-04-30 15:44:18
62Electronic commerce / ID-based encryption / ID-based cryptography / Clifford Cocks / Key / RSA / Public key infrastructure / Boneh/Franklin scheme / Certificate-based encryption / Cryptography / Key management / Public-key cryptography

Identity-Based Encryption with Conventional Public-Key Cryptography

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2005-02-23 11:34:53
63Electronic commerce / Cryptographic protocols / Identity management / Dispute resolution / Mediation / Digital credential / Public key certificate / Access control / PERMIS / Cryptography / Security / Public-key cryptography

2nd Annual PKI Research Workshop---Pre-Proceedings Mediating Between Strangers: A Trust Management Based Approach Joachim Biskup

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2003-04-24 19:14:30
64ID-based encryption / Public key infrastructure / Key generation / X.509 / Key / ID-based cryptography / Pretty Good Privacy / Cryptography / Public-key cryptography / Key management

Identity-Based Encryption with Conventional Public-Key Infrastructure Jon Callas PKI ‘05

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2005-04-20 03:22:08
65Cryptography / Password / Usability / Password strength / OTPW / Security / Identity management / Computer security

Exploring Usability Effects of Increasing Security in Click-based Graphical Passwords Elizabeth Stobert, Alain Forget, Sonia Chiasson, Paul van Oorschot, Robert Biddle Carleton University, Ottawa, Canada

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2011-10-05 16:35:01
66Key management / Secure communication / Public key infrastructure / Grid Security Infrastructure / Key-agreement protocol / X.509 / Transport Layer Security / Key exchange / Diffie–Hellman key exchange / Cryptography / Cryptographic protocols / Public-key cryptography

On the Application of Identity-Based Cryptography in Grid Security Hoon Wei Lim Thesis submitted to the University of London for the degree of Doctor of Philosophy

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2006-05-02 10:04:49
67Vehicle Identification Number / Stool-or-mat / Vulture / Bread bun / Egyptian hieroglyphs / Cryptography / ID-based encryption

An extended abstract of this work appeared in the proceedings of CRYPTO[removed]This is the full version. (Hierarchical) Identity-Based Encryption from Affine Message Authentication Olivier Blazy1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-25 11:30:50
68Boneh/Franklin scheme / Standard model / Digital signature / Secure channel / Information security / Key distribution / Cryptography / ID-based encryption / Public-key cryptography

NEW SECURITY NOTIONS FOR IDENTITY BASED ENCRYPTION By Sriramkrishnan Srinivasan

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2010-04-11 06:48:31
69Public-key cryptography / Signcryption / Digital signature / Cipher / Pairing-based cryptography / Key / Proxy re-encryption / Boneh/Franklin scheme / Cryptography / ID-based encryption / ID-based cryptography

Pairing-based Cryptography: Identity Based Encryption and Beyond

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-09 09:22:20
70Computer security / Privacy / OpenID / Credential / Internet privacy / Security Assertion Markup Language / X.509 / Password / Public-key cryptography / Identity management / Identity / Cryptography

Attribute-Based Credentials for Trust H2.1 - ABC4Trust Architecture for Developers Jan Camenisch, Ioannis Krontiris, Anja Lehmann, Gregory Neven, Christian Paquin, Kai Rannenberg

Add to Reading List

Source URL: abc4trust.eu

Language: English - Date: 2012-11-28 16:26:39
UPDATE