-
5
-
-
33646823652
-
Efficient Identity-Based Key Encapsulation to Multiple Parties
-
Cryptography and Coding, of
-
M. Barbosa and P. Farshim. Efficient Identity-Based Key Encapsulation to Multiple Parties. In Cryptography and Coding, volume 3796 of LNCS, 2005.
-
(2005)
LNCS
, vol.3796
-
-
Barbosa, M.1
Farshim, P.2
-
6
-
-
43249104504
-
Generic Constructions of Identity-Based and Certificateless KEMs
-
K. Bentahar, P. Farshim, J. Malone-Lee, and N.P. Smart, Generic Constructions of Identity-Based and Certificateless KEMs. Journal of Cryptology, 21(2):178-199, 2008.
-
(2008)
Journal of Cryptology
, vol.21
, Issue.2
, pp. 178-199
-
-
Bentahar, K.1
Farshim, P.2
Malone-Lee, J.3
Smart, N.P.4
-
7
-
-
24944562007
-
Hierarchical Identity-Based Encryption with Constant Size Ciphertext
-
EUROCRYPT, of, Springer
-
D. Boneh, X. Boyen, and E.-J. Goh. Hierarchical Identity-Based Encryption with Constant Size Ciphertext. In EUROCRYPT, volume 3494 of LNCS, pages 440-456. Springer, 2005.
-
(2005)
LNCS
, vol.3494
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.-J.3
-
8
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
CRYPTO, of, Springer
-
D. Boneh and M.K. Franklin. Identity-Based Encryption from the Weil Pairing. In CRYPTO, volume 2139 of LNCS, pages 213-229. Springer, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.K.2
-
9
-
-
38049045519
-
Conjunctive, Subset, and Range Queries on Encrypted Data
-
Proc. of the Jtih Theory of Cryptography Conf, of, Springer
-
D. Boneh and B. Waters. Conjunctive, Subset, and Range Queries on Encrypted Data. In Proc. of the Jtih Theory of Cryptography Conf., volume 4392 of LNCS, pages 535-554. Springer, 2007.
-
(2007)
LNCS
, vol.4392
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
10
-
-
24744432675
-
-
S. Buchegger and J.-Y. Le Boudec. Self-Policing Mobile Ad Hoc Networks by Reputation Systems. Communications Magazine, IEEE, 43(7):101-107, 2005.
-
S. Buchegger and J.-Y. Le Boudec. Self-Policing Mobile Ad Hoc Networks by Reputation Systems. Communications Magazine, IEEE, 43(7):101-107, 2005.
-
-
-
-
15
-
-
34548769351
-
Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control
-
IEEE Comp. Soc
-
P.-C. Cheng, P. Rohatgi, C. Keser, P.A. Karger, G.M. Wagner, and A.S. Reninger. Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control. In Proc. of the 2007 IEEE Syrnp. on Security and Privacy, pages 222-230. IEEE Comp. Soc, 2007.
-
(2007)
Proc. of the 2007 IEEE Syrnp. on Security and Privacy
, pp. 222-230
-
-
Cheng, P.-C.1
Rohatgi, P.2
Keser, C.3
Karger, P.A.4
Wagner, G.M.5
Reninger, A.S.6
-
22
-
-
70349557354
-
Hierarchical ID-Based Cryptography
-
ASIACRYPT, of, Springer
-
C. Gentry and A. Silverberg. Hierarchical ID-Based Cryptography. In ASIACRYPT, volume 2501 of LNCS, pages 548-566. Springer, 2002.
-
(2002)
LNCS
, vol.2501
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
25
-
-
33749611163
-
Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes with Key Revocation
-
Technical Report CACR 2006-04, University of Waterloo, Canada
-
K. Hoeper and G. Gong. Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes with Key Revocation. Technical Report CACR 2006-04, University of Waterloo, Canada, 2006.
-
(2006)
-
-
Hoeper, K.1
Gong, G.2
-
26
-
-
34250334357
-
Energy-Memory-Security Tradeoffs in Distributed Sensor Networks
-
Springer-Verlag
-
D. Hwang, B.-C. C. Lai, and I. Verbauwhede. Energy-Memory-Security Tradeoffs in Distributed Sensor Networks. In Ad-Hoc, Mobile, and Wireless Networks: 3rd Int. Conf., pages 70-81. Springer-Verlag, 2004.
-
(2004)
Ad-Hoc, Mobile, and Wireless Networks: 3rd Int. Conf
, pp. 70-81
-
-
Hwang, D.1
Lai, B.-C.C.2
Verbauwhede, I.3
-
32
-
-
0025022888
-
-
CD. McCollum and J.R. Messing L. Notargiacomo. Beyond the Pale of MAC and DAC-Defming New Forms of Access Control. In Proc. of the 1990 IEEE Symp. on Security and Privacy, pages 190-200. IEEE Comp. Soc, 1990.
-
CD. McCollum and J.R. Messing L. Notargiacomo. Beyond the Pale of MAC and DAC-Defming New Forms of Access Control. In Proc. of the 1990 IEEE Symp. on Security and Privacy, pages 190-200. IEEE Comp. Soc, 1990.
-
-
-
-
33
-
-
70349291859
-
-
P. Michiardi and R. Molva. CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks. In IFIP TC6/TC11 6th Joint Working Conf. on Communications and Multimedia Security, 228 of IFIP Conf. Proceedings, pages 107-121. Kluwer Academic, 2002.
-
P. Michiardi and R. Molva. CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks. In IFIP TC6/TC11 6th Joint Working Conf. on Communications and Multimedia Security, volume 228 of IFIP Conf. Proceedings, pages 107-121. Kluwer Academic, 2002.
-
-
-
-
36
-
-
33845437573
-
HORIZONTAL INTEGRATION: Broader Access Models for Realizing Information Dominance
-
Jason Program Office, Special Report JSR-04-13, MITRE Corporation
-
Jason Program Office. HORIZONTAL INTEGRATION: Broader Access Models for Realizing Information Dominance. Special Report JSR-04-13, MITRE Corporation, 2004.
-
(2004)
-
-
-
37
-
-
33749984492
-
A Comparison of MNT Curves and Supersingular Curves
-
D. Page, N.P. Smart, and F. Vercauteren. A Comparison of MNT Curves and Supersingular Curves. Applicable Algebra in Engineering, Communication and Computing, 17(5):379-392, 2006.
-
(2006)
Applicable Algebra in Engineering, Communication and Computing
, vol.17
, Issue.5
, pp. 379-392
-
-
Page, D.1
Smart, N.P.2
Vercauteren, F.3
-
40
-
-
34548774576
-
Multi-Dimensional Range Query Over Encrypted Data
-
IEEE Comp. Soc
-
E. Shi, J. Bethencourt, T.-H. Chan, D. Song, and A. Perrig. Multi-Dimensional Range Query Over Encrypted Data. In Proc. of the 2007 IEEE Symp. on Security and Privacy, pages 350-364. IEEE Comp. Soc, 2007.
-
(2007)
Proc. of the 2007 IEEE Symp. on Security and Privacy
, pp. 350-364
-
-
Shi, E.1
Bethencourt, J.2
Chan, T.-H.3
Song, D.4
Perrig, A.5
-
43
-
-
1842829828
-
Risk Management Guide for Information Technology Systems
-
Special Report 800-300, NIST, 2002
-
G. Stoneburner, A. Goguen, and A. Feringa. Risk Management Guide for Information Technology Systems. Special Report 800-300, NIST, 2002.
-
-
-
Stoneburner, G.1
Goguen, A.2
Feringa, A.3
-
44
-
-
47949111299
-
Verified Enforcement of Security Policies for Cross-Domain Information Flows
-
IEEE Comp. Soc
-
N. Swamy, M. Hicks, and S. Tsang. Verified Enforcement of Security Policies for Cross-Domain Information Flows. In Proc. of the 2007 Military Communications Conf., pages 192-206. IEEE Comp. Soc, 2007.
-
(2007)
Proc. of the 2007 Military Communications Conf
, pp. 192-206
-
-
Swamy, N.1
Hicks, M.2
Tsang, S.3
-
47
-
-
3142738238
-
Supporting Reputation based Trust in Peer-to-Peer Communities
-
L. Xiong and L. Liu. Supporting Reputation based Trust in Peer-to-Peer Communities. In IEEE Transactions on Knowledge and Data Engineering, Special Issue on Peer-to-Peer Based Data Management, 16(7), 2004.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.7
-
-
Xiong, L.1
Liu, L.2
-
50
-
-
0042933944
-
Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks
-
IEEE Press
-
S. Zhong, J. Chen, and Y. R. Yang. Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks. In Proc. of the 22nd Annual Joint Conf. of the IEEE Computer and Communications Societies, pages 1987-1997. IEEE Press, 2003.
-
(2003)
Proc. of the 22nd Annual Joint Conf. of the IEEE Computer and Communications Societies
, pp. 1987-1997
-
-
Zhong, S.1
Chen, J.2
Yang, Y.R.3
-
51
-
-
34548493227
-
On Designing Incentive-Compatible Routing and Forwarding Protocols in Wireless Ad-Hoc Networks: An Integrated Approach Using Game Theoretic and Cryptographic Techniques
-
S. Zhong, L.E. Li, Y.G. Liu, and Y.R. Yang. On Designing Incentive-Compatible Routing and Forwarding Protocols in Wireless Ad-Hoc Networks: An Integrated Approach Using Game Theoretic and Cryptographic Techniques. Wireless Networks, 13(6):799-816, 2007.
-
(2007)
Wireless Networks
, vol.13
, Issue.6
, pp. 799-816
-
-
Zhong, S.1
Li, L.E.2
Liu, Y.G.3
Yang, Y.R.4
|