-
1
-
-
0345490607
-
Certiflcateless Public Key Cryptography
-
C.-S. Laih ed, ASIACRYPT 2003
-
S.S. Al-Riyami and K.G. Paterson. Certiflcateless Public Key Cryptography. In C.-S. Laih (ed.), ASIACRYPT 2003, Springer LNCS 2894, pp. 452-473, 2003.
-
(2003)
Springer LNCS
, vol.2894
, pp. 452-473
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
2
-
-
0027726717
-
Random Oracles are Practical: A Paradigm for Designing Efficient Protocols
-
ACM Press
-
M. Bellare and P. Rogaway. Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In ACM Conference on Computer and Communications Security 1993, pp. 62-73, ACM Press, 1993.
-
(1993)
ACM Conference on Computer and Communications Security
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
J. Kilian ed, CRYPTO 2001
-
D. Boneh and M.K. Franklin. Identity-Based Encryption from the Weil Pairing. In J. Kilian (ed.), CRYPTO 2001, Springer LNCS Vol. 2139, pp. 213-229, 2001.
-
(2001)
Springer LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.K.2
-
4
-
-
28144462281
-
Universally Composable Security: A New Paradigm for Cryptographic Protocols. Cryptology ePrint Archive
-
Report 2000/067
-
R. Canetti. Universally Composable Security: A New Paradigm for Cryptographic Protocols. Cryptology ePrint Archive, Report 2000/067, http://eprint.iacr.org/, 2000.
-
(2000)
-
-
Canetti, R.1
-
6
-
-
70349557354
-
Hierarchical ID-Based Cryptography
-
Y Zheng ed, ASIACRYPT 2002
-
C. Gentry and A. Silverberg. Hierarchical ID-Based Cryptography. In Y Zheng (ed.), ASIACRYPT 2002, Springer LNCS Vol. 2501, pp. 548-566, 2002.
-
(2002)
Springer LNCS
, vol.2501
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
7
-
-
33749611163
-
Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes with Key Revocation
-
Technical Report CACR 2006-04, Centre for Applied Cryptographic Research (CACR) at the University of Waterloo, Canada
-
K. Hoeper and G. Gong. Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes with Key Revocation, Technical Report CACR 2006-04, Centre for Applied Cryptographic Research (CACR) at the University of Waterloo, Canada, 2006.
-
(2006)
-
-
Hoeper, K.1
Gong, G.2
-
8
-
-
33749603013
-
Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks
-
T. Kunz and S.S. Ravi eds, Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference
-
K. Hoeper and G. Gong. Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks. In T. Kunz and S.S. Ravi (eds.), Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, Springer LNCS 4104, pp. 224-237, 2006.
-
(2006)
Springer LNCS
, vol.4104
, pp. 224-237
-
-
Hoeper, K.1
Gong, G.2
-
11
-
-
84943807207
-
Toward Secure Key Distribution in Truly Ad-Hoc Networks
-
Washington, DC, USA, IEEE Computer Society
-
A. Khalili, J. Katz, and W.A. Arbaugh. Toward Secure Key Distribution in Truly Ad-Hoc Networks. In SAINT-W '03: Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops), pp. 342-346, Washington, DC, USA, 2003. IEEE Computer Society.
-
(2003)
SAINT-W '03: Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
, pp. 342-346
-
-
Khalili, A.1
Katz, J.2
Arbaugh, W.A.3
-
13
-
-
33746100516
-
Cryptography from Pairings
-
LE Blake, G. Seroussi and N.P. Smart eds, Advances in Elliptic Curve Cryptography, Cambridge University Press
-
K.G. Paterson. Cryptography from Pairings. In LE Blake, G. Seroussi and N.P. Smart (eds.), Advances in Elliptic Curve Cryptography, London Mathematical Society Lecture Note Series Vol. 317, Cambridge University Press, 2005, pp. 215-251.
-
(2005)
London Mathematical Society Lecture Note Series
, vol.317
, pp. 215-251
-
-
Paterson, K.G.1
-
14
-
-
1942473586
-
A comparison between traditional Public Key Infrastructures and Identity-Based Cryptography
-
8(3):57-72, 2003
-
K.G. Paterson and G. Price. A comparison between traditional Public Key Infrastructures and Identity-Based Cryptography. Information Security Technical Report, Vol. 8(3):57-72, 2003.
-
Information Security Technical Report
-
-
Paterson, K.G.1
Price, G.2
-
15
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
CR. Blakley and D.Chaum eds, CRYPTO '84
-
A. Shamir. Identity-based cryptosystems and signature schemes. In CR. Blakley and D.Chaum (eds.), CRYPTO '84, Springer LNCS Vol. 196, pp. 47-53, 1985.
-
(1985)
Springer LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
|