-
1
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Advances in Cryptology-CRYPTO 2001
-
D. Boneh and M. Franklin, Identity-based encryption from the Weil pairing, Advances in Cryptology-CRYPTO 2001, LNCS 2139, 2001, pp. 213-229.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
2
-
-
0032649638
-
The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystem
-
G. Frey, M. Muller, and H. Ruck. The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystem. IEEE Transactions on Information Theory, Vol. 45, No. 5, 1999, pp. 1717-1719.
-
(1999)
IEEE Transactions on Information Theory
, vol.45
, Issue.5
, pp. 1717-1719
-
-
Frey, G.1
Muller, M.2
Ruck, H.3
-
4
-
-
85020598353
-
Identity based on cryptosystems and signature schemes
-
Shamir. Identity based on cryptosystems and signature schemes. Advances in Cryptology-Crypto'84, 1984, pp. 47-53.
-
(1984)
Advances in Cryptology-crypto'84
, pp. 47-53
-
-
Shamir1
-
5
-
-
16244372424
-
A group key management architecture for mobile ad-hoc wireless networks
-
K-H Rhee, Y-H Park and G. Tsudik., A group key management architecture for mobile ad-hoc wireless networks, journal of information science and engineering 21, 2005, pp. 415-428.
-
(2005)
Journal of Information Science and Engineering
, vol.21
, pp. 415-428
-
-
Rhee, K.-H.1
Park, Y.-H.2
Tsudik, G.3
-
6
-
-
84944050090
-
Applications of multiple trust authorities in pairing based cryptosystems
-
proceedings of Infrastructure Security Conference 2002, Springer-Verlag
-
L. Chen, K. Harrison, N.P. Smart and D. Soldera. Applications of multiple trust authorities in pairing based cryptosystems. In proceedings of Infrastructure Security Conference 2002, LNCS 2437, Springer-Verlag, 2002, pp. 260-275.
-
(2002)
LNCS
, vol.2437
, pp. 260-275
-
-
Chen, L.1
Harrison, K.2
Smart, N.P.3
Soldera, D.4
-
8
-
-
7744225358
-
Efficient identity-based security schemes for ad hoc network routing protocols
-
M. Bohio and A. Miri. Efficient identity-based security schemes for ad hoc network routing protocols. Ad hoc networks 2, 2004, pp. 309-317.
-
(2004)
Ad Hoc Networks
, vol.2
, pp. 309-317
-
-
Bohio, M.1
Miri, A.2
-
9
-
-
84946840347
-
Short signatures from the Weil pairing
-
C. Boyd, editor, Advances in Cryptology-Asiacrypt 2001, Springer-Verlag
-
Boneh, D. B. Lynn, and H. Shacham. 2001. Short signatures from the Weil pairing. In C. Boyd, editor, Advances in Cryptology-Asiacrypt 2001, LNCS 2248, Springer-Verlag: 514-532.
-
(2001)
LNCS
, vol.2248
, pp. 514-532
-
-
Boneh, D.B.L.1
Shacham, H.2
-
10
-
-
0037974305
-
Exponent group signature schemes and efficient identity based signature schemes based on pairings
-
F. Hess, exponent group signature schemes and efficient identity based signature schemes based on pairings. Cryptology ePrint Archive, Report 2002/012, 2002. http://eprint.iacr.org/2002/012.
-
(2002)
Cryptology EPrint Archive, Report
, vol.2002
, Issue.12
-
-
Hess, F.1
-
11
-
-
0345755816
-
Adaptive security for multilevel ad hoc networks
-
J. Kong, H. Luo, K. Xu, D. L. Gu, M. Gerla, and S. Lu, " Adaptive security for multilevel ad hoc networks," Wireless Communications and Mobile Computing, Vol. 2, 2002, pp. 533-547.
-
(2002)
Wireless Communications and Mobile Computing
, vol.2
, pp. 533-547
-
-
Kong, J.1
Luo, H.2
Xu, K.3
Gu, D.L.4
Gerla, M.5
Lu, S.6
-
12
-
-
1342306709
-
Security for cluster based ad hoc networks
-
V. Varadharajan, R. Shankaran, M. Hitchens, "Security for cluster based ad hoc networks," Computer Communications 27(2004), pp. 488-501.
-
(2004)
Computer Communications
, vol.27
, pp. 488-501
-
-
Varadharajan, V.1
Shankaran, R.2
Hitchens, M.3
|