-
1
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
Springer-Verlag
-
G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik, "A practical and provably secure coalition-resistant group signature scheme," in Proceedings of CRYPTO'00 on Advances in cryptology, LNCS 1880, pp. 255-270, Springer-Verlag, 2000.
-
(2000)
Proceedings of CRYPTO'00 on Advances in cryptology, LNCS 1880
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
2
-
-
35048840186
-
Identity-based threshold de-cryption
-
Springer-Verlag
-
J. Baek and Y. Zheng, "Identity-based threshold de-cryption," in Proceedings of the 7th International Workshop on Theory and Practice in Public Key Cryptography (PKC'04), LNCS 2947, pp. 262-276, Springer-Verlag, 2004.
-
(2004)
Proceedings of the 7th International Workshop on Theory and Practice in Public Key Cryptography (PKC'04), LNCS 2947
, pp. 262-276
-
-
Baek, J.1
Zheng, Y.2
-
4
-
-
1142270258
-
Identity-based mediated RS
-
Jeju Island, Korea
-
D. Boneh, X. Ding, and G. Tsudik, "Identity-based mediated RSA," in Proceedings of the third Interna-tional Workshop on Information and Security Appli-cations (WISA'02), Jeju Island, Korea, 2002.
-
(2002)
Proceedings of the third Interna-tional Workshop on Information and Security Appli-cations (WISA'02)
-
-
Boneh, D.1
Ding, X.2
Tsudik, G.3
-
5
-
-
85084163661
-
A method for fast revocation of public key certifi-cates and security capabilitie
-
USENIX
-
D. Boneh, X. Ding, G. Tsudik, and C. Wong, "A method for fast revocation of public key certifi-cates and security capabilities," in Proceedings of the 10th USENIX Security Symposium, pp. 297-308. USENIX, 2001.
-
(2001)
Proceedings of the 10th USENIX Security Symposium
, pp. 297-308
-
-
Boneh, D.1
Ding, X.2
Tsudik, G.3
Wong, C.4
-
6
-
-
84874324906
-
Identity-based en-cryption from the weil pairin
-
Springer-Verlag
-
D. Boneh and M.K. Franklin, "Identity-based en-cryption from the weil pairing," in Proceedings of CRYPTO'01 on Advances in cryptology, LNCS 2139, pp. 213-229, Springer-Verlag, 2001.
-
(2001)
Proceedings of CRYPTO'01 on Advances in cryptology, LNCS 2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.K.2
-
8
-
-
0742290132
-
How Iris recognition work
-
J. G. Daugman, "How Iris recognition works," IEEE Transaction on Circuits and Systems for Video Tech-nology, vol. 14, no. 1, pp. 21-30, 2004.
-
(2004)
IEEE Transaction on Circuits and Systems for Video Tech-nology
, vol.14
, Issue.1
, pp. 21-30
-
-
Daugman, J.G.1
-
9
-
-
35048865463
-
Fuzzy extrac-tor: how to generate string keys from biometrics and other noisy dat
-
Springer-Verlag
-
Y. Dodis, L. Reyzin, and S. Smith, "Fuzzy extrac-tor: how to generate string keys from biometrics and other noisy data," in Proceedings of EURO-CRYPT'04 on Advances in Cryptology, LNCS 3027, pp. 523-540, Springer-Verlag, 2004.
-
(2004)
Proceedings of EURO-CRYPT'04 on Advances in Cryptology, LNCS 3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, S.3
-
10
-
-
84955339164
-
Secure integration of asymmetric and symmetric encryption schemes
-
Springer-Verlag
-
E. Fujisaki and T. Okamoto, "Secure integration of asymmetric and symmetric encryption schemes," LNCS 1666, pp. 537-554, Springer-Verlag, 1999.
-
(1999)
LNCS 1666
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
11
-
-
70349557354
-
Hierarchical ID-based cryptograph
-
Springer-Verlag
-
C. Gentry and A. Silverberg, "Hierarchical ID-based cryptography," in Proceedings of ASIACRYPT'02 on Advances in cryptology, LNCS 2501, pp. 548-566, Springer-Verlag, 2002.
-
(2002)
Proceedings of ASIACRYPT'02 on Advances in cryptology, LNCS 2501
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
12
-
-
0037743010
-
Software implementation of finite fields of characteristic three, for use in pairing based cryptosystem
-
K. Harrison, D. Page, and N. P. Smart, "Software implementation of finite fields of characteristic three, for use in pairing based cryptosystems," London Mathematical Society Journal of Computing Math-emetics, vol. 5, pp. 181-193, 2002.
-
(2002)
London Mathematical Society Journal of Computing Math-emetics
, vol.5
, pp. 181-193
-
-
Harrison, K.1
Page, D.2
Smart, N.P.3
-
13
-
-
0035164290
-
Fingerprint matching using minutiae and texture feature
-
A. Jain, A. Ross, and S. Prabhakar, "Fingerprint matching using minutiae and texture features," in Proceedings of the International Conference on Im-age Processing (ICIP), pp. 282-285, 2001.
-
(2001)
Proceedings of the International Conference on Im-age Processing (ICIP)
, pp. 282-285
-
-
Jain, A.1
Ross, A.2
Prabhakar, S.3
-
16
-
-
85084163045
-
Towards voice generated cryptographic keys on ressource constrained device
-
F. Monrose, M. K. Reiter, Q. Li, D. Lopresti, and C. Shih, "Towards voice generated cryptographic keys on ressource constrained devices," in Pro-ceedings of the 11th USENIX Security Symposium, pp. 283-296, 2002.
-
(2002)
Pro-ceedings of the 11th USENIX Security Symposium
, pp. 283-296
-
-
Monrose, F.1
Reiter, M.K.2
Li, Q.3
Lopresti, D.4
Shih, C.5
-
17
-
-
0034829626
-
Cryptographic key generation from voice
-
IEEE Press
-
F. Monrose, M. K. Reiter, Q. Li, and S. Wetzel, "Cryptographic key generation from voice," in Pro-ceedings of the IEEE Conference on Security and Pri-vacy, pp. 202-213, IEEE Press, 2001.
-
(2001)
Pro-ceedings of the IEEE Conference on Security and Pri-vacy
, pp. 202-221
-
-
Monrose, F.1
Reiter, M.K.2
Li, Q.3
Wetzel, S.4
-
18
-
-
0033281372
-
Password hardening based on key-stroke dynamics
-
ACM Press
-
F. Monrose, M. K. Reiter, and S. Wetzel, "Password hardening based on key-stroke dynamics," in Pro-ceedings of the 6th ACM Conference on Computer and Communications Security (CCS'99), pp. 73-82, ACM Press, 1999.
-
(1999)
Pro-ceedings of the 6th ACM Conference on Computer and Communications Security(CCS'99)
, pp. 73-82
-
-
Monrose, F.1
Reiter, M.K.2
Wetzel, S.3
-
19
-
-
35048885243
-
Using mediated identity-based cryptography to support role-based access control
-
Springer-Verlag
-
D. Nali, C. Adams, and A. Miri, "Using mediated identity-based cryptography to support role-based access control," in Proceedings of the 7th Information Security Conference (ISC'04), LNCS 3225, pp. 245-256, Springer-Verlag, 2004.
-
(2004)
Proceedings of the 7th Information Security Conference(ISC'04), LNCS 3225
, pp. 245-256
-
-
Nali, D.1
Adams, C.2
Miri, A.3
-
20
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryp-tosystems
-
R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryp-tosystems," Communications of the ACM, vol. 21, pp. 120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
22
-
-
85020598353
-
Identity-based cryptosystems and sig-nature schemes
-
Springer-Verlag, New York, Inc
-
A. Shamir, "Identity-based cryptosystems and sig-nature schemes," in Proceedings of CRYPTO'84 on Advances in Cryptology, pp. 47-53. Springer-Verlag, New York, Inc., 1984.
-
(1984)
Proceedings of CRYPTO'84 on Advances in Cryptology
, pp. 47-53
-
-
Shamir, A.1
-
23
-
-
14844297376
-
"ID-based encryption for complex hierarchies with ap-plications to forward security and broadcast encryp-tion
-
ACM Press
-
D. Yao, N. Fazio, Y. Dodis, and A. Lysyanskaya, "ID-based encryption for complex hierarchies with ap-plications to forward security and broadcast encryp-tion," in Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS'04), pp. 354-363, ACM Press, 2004.
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS'04)
, pp. 354-363
-
-
Yao, D.1
Fazio, N.2
Dodis, Y.3
Lysyanskaya, A.4
|