-
1
-
-
0345490607
-
Certificateless public key cryptography
-
Springer-Verlag
-
S. Al-Riyami and K. Paterson. Certificateless public key cryptography. In ASIACRYPT, pages 452-473. Springer-Verlag, 2003.
-
(2003)
ASIACRYPT
, pp. 452-473
-
-
Al-Riyami, S.1
Paterson, K.2
-
3
-
-
84941163332
-
Escrow-free encryption supporting cryptographic workflow
-
S.S. Al-Riyami, J. Malone-Lee, and N.P. Smart. Escrow-free encryption supporting cryptographic workflow. Cryptology ePrint Archive, Report 2004/258, 2004. http://eprint.iacr.org/.
-
(2004)
Cryptology EPrint Archive, Report
, vol.2004
, Issue.258
-
-
Al-Riyami, S.S.1
Malone-Lee, J.2
Smart, N.P.3
-
4
-
-
26444464784
-
Policy-based cryptography and applications
-
Proceedings of Financial Cryptography and Data Security (FC'05), Springer-Verlag
-
W. Bagga and R. Molva. Policy-based cryptography and applications. In Proceedings of Financial Cryptography and Data Security (FC'05), volume 3570 of LNCS, pages 72-87. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3570
, pp. 72-87
-
-
Bagga, W.1
Molva, R.2
-
6
-
-
14844297757
-
Concealing complex policies with hidden credentials
-
R. Bradshaw, J. Holt, and K. Seamons. Concealing complex policies with hidden credentials. Cryptology ePrint Archive, Report 2004/109, 2004. http://eprint.iacr.org/.
-
(2004)
Cryptology EPrint Archive, Report
, vol.2004
, Issue.109
-
-
Bradshaw, R.1
Holt, J.2
Seamons, K.3
-
7
-
-
84944050090
-
Applications of multiple trust authorities in pairing based cryptosystems
-
Springer-Verlag
-
L. Chen, K. Harrison, D. Soldera, and N. Smart. Applications of multiple trust authorities in pairing based cryptosystems. In Proceedings of the International Conference on Infrastructure Security, pages 260-275. Springer-Verlag, 2002.
-
(2002)
Proceedings of the International Conference on Infrastructure Security
, pp. 260-275
-
-
Chen, L.1
Harrison, K.2
Soldera, D.3
Smart, N.4
-
11
-
-
0035994207
-
Entropy, independent sets and antichains: A new approach to dedekind's problem
-
J. Kahn. Entropy, independent sets and antichains: a new approach to dedekind's problem. In Proc. Amer. Math. Soc. 130, pages 371-378, 2002.
-
(2002)
Proc. Amer. Math. Soc.
, vol.130
, pp. 371-378
-
-
Kahn, J.1
-
12
-
-
84968521041
-
On dedekind's problem: The number of monotone boolean functions
-
D. Kleitman. On dedekind's problem: the number of monotone boolean functions. In Proc. Amer. Math. Soc. 21, pages 677-682, 1969.
-
(1969)
Proc. Amer. Math. Soc.
, vol.21
, pp. 677-682
-
-
Kleitman, D.1
-
14
-
-
35248891001
-
Access control using pairing based cryptography
-
Springer-Verlag LNCS 2612, April
-
N. Smart. Access control using pairing based cryptography. In Proceedings CT-RSA 2003, pages 111-121. Springer-Verlag LNCS 2612, April 2003.
-
(2003)
Proceedings CT-RSA 2003
, pp. 111-121
-
-
Smart, N.1
-
15
-
-
26444583727
-
A note on the bilinear diffie-hellman assumption
-
Y. Yacobi. A note on the bilinear diffie-hellman assumption. Cryptology ePrint Archive, Report 2002/113, 2002. http://eprint.iacr.org/.
-
(2002)
Cryptology EPrint Archive, Report
, vol.2002
, Issue.113
-
-
Yacobi, Y.1
|