-
1
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
M. Yung, editor, Springer-Verlag LNCS 2442
-
P.S.L.M. Barreto, H.Y. Kim, B. Lynn, and M. Scott. Efficient algorithms for pairing-based cryptosystems. In M. Yung, editor, Advances in Cryptology - Proceedings of CRYPTO 2002, pages 354-368. Springer-Verlag LNCS 2442, 2002.
-
(2002)
Advances in Cryptology - Proceedings of CRYPTO 2002
, pp. 354-368
-
-
Barreto, P.S.L.M.1
Kim, H.Y.2
Lynn, B.3
Scott, M.4
-
2
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
J. Kilian, editor. Springer-Verlag LNCS 2139
-
D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. In J. Kilian, editor, Advances in Cryptology - Proceedings of CRYPTO 2001, pages 213-229. Springer-Verlag LNCS 2139, 2001.
-
(2001)
Advances in Cryptology - Proceedings of CRYPTO 2001
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
5
-
-
0036471031
-
The Grid: A new infrastructure for 21st century science
-
February
-
I. Foster. The Grid: A new infrastructure for 21st century science. Physics Today, 55(2):42-47, February 2002.
-
(2002)
Physics Today
, vol.55
, Issue.2
, pp. 42-47
-
-
Foster, I.1
-
6
-
-
0032218229
-
A security architecture for computational Grids
-
ACM Press
-
I. Foster, C. Kesselman, G. Tsudik, and S. Tuecke. A security architecture for computational Grids. In Proceedings of the 5th ACM Computer and Communications Security Conference, pages 83-92. ACM Press, 1998.
-
(1998)
Proceedings of the 5th ACM Computer and Communications Security Conference
, pp. 83-92
-
-
Foster, I.1
Kesselman, C.2
Tsudik, G.3
Tuecke, S.4
-
7
-
-
35048897942
-
On identity-based cryptography and GRID computing
-
M. Bubak, G.D.v Albada, P.M.A. Sloot, and J.J. Dongarra, editors. Springer-Verlag LNCS 3036
-
H.W. Lim and M.J.B. Robshaw. On identity-based cryptography and GRID computing. In M. Bubak, G.D.v Albada, P.M.A. Sloot, and J.J. Dongarra, editors, Proceedings of the 4th International Conference on Computational Science (ICCS 2004), pages 474-477. Springer-Verlag LNCS 3036, 2004.
-
(2004)
Proceedings of the 4th International Conference on Computational Science (ICCS 2004)
, pp. 474-477
-
-
Lim, H.W.1
Robshaw, M.J.B.2
-
8
-
-
84887853842
-
A community authorization service for group collaboration
-
IEEE Computer Society Press, June
-
L. Pearlman, V. Welch, I. Foster, C. Kesselman, and S. Tuecke. A community authorization service for group collaboration. In Proceedings of the 3rd IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'02), pages 50-59. IEEE Computer Society Press, June 2002.
-
(2002)
Proceedings of the 3rd IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
, pp. 50-59
-
-
Pearlman, L.1
Welch, V.2
Foster, I.3
Kesselman, C.4
Tuecke, S.5
-
9
-
-
33845866983
-
The community authorization service: Status and future
-
March
-
L. Pearlman, V. Welch, I. Foster, C. Kesselman, and S. Tuecke. The community authorization service: Status and future. In Proceedings of Computing in High Energy and Nuclear Physics (CHEP03), eConf, March 2003.
-
(2003)
Proceedings of Computing in High Energy and Nuclear Physics (CHEP03), EConf
-
-
Pearlman, L.1
Welch, V.2
Foster, I.3
Kesselman, C.4
Tuecke, S.5
-
10
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
G. R. Blakley and D. Chaum, editors. Springer-Verlag LNCS 196
-
A. Shamir. Identity-based cryptosystems and signature schemes. In G. R. Blakley and D. Chaum, editors, Advances in Cryptology - Proceedings of CRYPTO '84, pages 47-53. Springer-Verlag LNCS 196, 1985.
-
(1985)
Advances in Cryptology - Proceedings of CRYPTO '84
, pp. 47-53
-
-
Shamir, A.1
-
12
-
-
0004001001
-
Internet X.509 public key infrastructure proxy certificate profile
-
RFC 3820, June
-
S. Tuecke, V. Welch, D. Engert, L. Pearman, and M. Thompson. Internet X.509 public key infrastructure proxy certificate profile. The Internet Engineering Task Force (IETF), RFC 3820, June 2004.
-
(2004)
The Internet Engineering Task Force (IETF)
-
-
Tuecke, S.1
Welch, V.2
Engert, D.3
Pearman, L.4
Thompson, M.5
-
13
-
-
17644368658
-
X.509 proxy certificates for dynamic delegation
-
V. Welch, I. Foster, C. Kesselman, O. Mulmo, L. Pearlman, S. Tuecke, J. Gawor, S. Meder, and F. Siebenlist. X.509 proxy certificates for dynamic delegation. In Proceedings of the 3rd Annual PKI R&D Workshop, 2004.
-
(2004)
Proceedings of the 3rd Annual PKI R&D Workshop
-
-
Welch, V.1
Foster, I.2
Kesselman, C.3
Mulmo, O.4
Pearlman, L.5
Tuecke, S.6
Gawor, J.7
Meder, S.8
Siebenlist, F.9
-
14
-
-
84942318236
-
Security for Grid services
-
IEEE Computer Society Press, June
-
V. Welch, F. Siebenlist, I. Foster, J. Bresnahan, K. Czajkowski, J. Gawor, C. Kesselman, S. Meder, L. Pearlman, and S. Tuecke. Security for Grid services. In Proceedings of the 12th IEEE International Symposium on High Performance Distributed Computing (HPDC-12 2003), pages 48-61. IEEE Computer Society Press, June 2003.
-
(2003)
Proceedings of the 12th IEEE International Symposium on High Performance Distributed Computing (HPDC-12 2003)
, pp. 48-61
-
-
Welch, V.1
Siebenlist, F.2
Foster, I.3
Bresnahan, J.4
Czajkowski, K.5
Gawor, J.6
Kesselman, C.7
Meder, S.8
Pearlman, L.9
Tuecke, S.10
|