Identity-based cryptography

Results: 85



#Item
1Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography Aniket Kate Ian Goldberg David R. Cheriton School of Computer Science University of Waterloo

Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography Aniket Kate Ian Goldberg David R. Cheriton School of Computer Science University of Waterloo

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2010-07-23 17:06:12
    2EMBARGOED FOR RELEASE March 31, 12:01 a.m. ET Bruce Shriver ACMMarie Gentile

    EMBARGOED FOR RELEASE March 31, 12:01 a.m. ET Bruce Shriver ACMMarie Gentile

    Add to Reading List

    Source URL: fellows.acm.org

    Language: English - Date: 2015-03-30 17:41:07
    3Reset Secure Identity-Based Identification Schemes without Pairing Ji-Jian Chin, Hiroaki Anada Syh-Yuan Tan Direction and Motivations  Cryptography: the art and science of concealing

    Reset Secure Identity-Based Identification Schemes without Pairing Ji-Jian Chin, Hiroaki Anada Syh-Yuan Tan Direction and Motivations  Cryptography: the art and science of concealing

    Add to Reading List

    Source URL: security-lab.jaist.ac.jp

    Language: English - Date: 2015-11-23 04:37:54
    4ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

    ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

    Add to Reading List

    Source URL: www.ijmetmr.com

    Language: English - Date: 2015-07-06 14:15:02
    5Concepts and Languages for Privacy-Preserving Attribute-Based AuthenticationI,II Jan Camenischa,∗, Maria Dubovitskayaa,b , Robert R. Enderleina,b,∗∗, Anja Lehmanna , Gregory Nevena , Christian Paquinc , Franz-Stefa

    Concepts and Languages for Privacy-Preserving Attribute-Based AuthenticationI,II Jan Camenischa,∗, Maria Dubovitskayaa,b , Robert R. Enderleina,b,∗∗, Anja Lehmanna , Gregory Nevena , Christian Paquinc , Franz-Stefa

    Add to Reading List

    Source URL: www.e7n.ch

    Language: English
    6ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

    ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

    Add to Reading List

    Source URL: www.ijmetmr.com

    Language: English - Date: 2015-06-03 03:06:48
    7GMOC and GENI Security Architecture – Joint Effort  The  team   currently  plans to implement  attribute­based credential  mechanisms  to enforce   the  policies for sharing operational data w

    GMOC and GENI Security Architecture – Joint Effort  The  team   currently  plans to implement  attribute­based credential  mechanisms  to enforce   the  policies for sharing operational data w

    Add to Reading List

    Source URL: groups.geni.net

    Language: English - Date: 2009-07-15 10:58:06
    8A Survey on Craptological Pairing Algorithms PauloS.//// LMBarreto Anonymized for submission

    A Survey on Craptological Pairing Algorithms PauloS.//// LMBarreto Anonymized for submission

    Add to Reading List

    Source URL: www.anagram.com

    Language: English - Date: 2010-11-11 14:43:35
    9Delegation Logic: A Logic-based Approach to Distributed Authorization NINGHUI LI Stanford University BENJAMIN N. GROSOF Massachusetts Institute of Technology

    Delegation Logic: A Logic-based Approach to Distributed Authorization NINGHUI LI Stanford University BENJAMIN N. GROSOF Massachusetts Institute of Technology

    Add to Reading List

    Source URL: cs-www.cs.yale.edu

    Language: English - Date: 2002-12-29 15:33:54
    102015 IEEE Symposium on Security and Privacy  Forward Secure Asynchronous Messaging from Puncturable Encryption Matthew D. Green and Ian Miers Department of Computer Science

    2015 IEEE Symposium on Security and Privacy Forward Secure Asynchronous Messaging from Puncturable Encryption Matthew D. Green and Ian Miers Department of Computer Science

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2015-05-11 16:43:14