메뉴 건너뛰기




Volumn 2005, Issue 8, 2005, Pages 4-8

Identity infrastructure: Security considerations

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; DATABASE SYSTEMS; SECURITY OF DATA; SECURITY SYSTEMS; STRATEGIC PLANNING;

EID: 24144460628     PISSN: 13613723     EISSN: None     Source Type: Journal    
DOI: 10.1016/S1361-3723(05)70242-6     Document Type: Article
Times cited : (1)

References (4)
  • 2
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues, cryptography and coding - Institute of mathematics and its applications international conference on cryp-tography and coding
    • Proceedings of IMA 2001 Springer-Verlag
    • C. C. Cocks, An Identity Based Encryption Scheme Based on Quadratic Residues, Cryptography and Coding - Institute of Mathematics and Its Applications International Conference on Cryp-tography and Coding { Proceedings of IMA 2001, LNCS 2260, pages 360{363, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2260 , pp. 360363
    • Cocks, C.C.1
  • 3
    • 0037623983 scopus 로고    scopus 로고
    • Identity based encryption from the Weil pairing,m
    • D Boneh and M Franklin, Identity based encryption from the Weil pairing, m SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003.
    • (2003) SIAM J. of Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 4
    • 0012970453 scopus 로고    scopus 로고
    • Extended abstract in proceedings of Crypto '2001 Springer-Verlag
    • (Extended abstract in proceedings of Crypto '2001, Lecture Notes in Computer Science, Vol. 2139, Springer-Verlag, pp. 213-229, 2001).
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 213-229


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.