-
1
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
LNCS 2139
-
Boneh, D. and Franklin, M. (2001) ‘Identity-based encryption from the weil pairing’, Advances in Cryptology – CRYPTO ’2001, LNCS 2139, pp.213–229.
-
(2001)
Advances in Cryptology – CRYPTO ’2001
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
2
-
-
35048899816
-
Key agreemet using statically keyed authenticators
-
LNCS 3089
-
Boyd, C., Mao, W. and Paterson, K.G. (2004) ‘Key agreemet using statically keyed authenticators’, Applied Cryptography and Network Security, ACNS 2004, LNCS 3089, pp.248–262.
-
(2004)
Applied Cryptography and Network Security, ACNS 2004
, pp. 248-262
-
-
Boyd, C.1
Mao, W.2
Paterson, K.G.3
-
3
-
-
84944050090
-
Applications of multiple trust authorities in pairing based cryptosystems
-
LNCS 2437
-
Chen, L., Harrison, K., Soldera, D. and Smart, N.P. (2002) ‘Applications of multiple trust authorities in pairing based cryptosystems’, InfraSec 2002, LNCS 2437, pp.260–275.
-
(2002)
InfraSec 2002
, pp. 260-275
-
-
Chen, L.1
Harrison, K.2
Soldera, D.3
Smart, N.P.4
-
5
-
-
3042546547
-
Threshold and identity-based key management and authentication for wireless ad hoc networks
-
Deng H., Mukherjee, A. and Agrawal, D.P. (2004) ‘Threshold and identity-based key management and authentication for wireless ad hoc networks’, International Conference on Information Technology: Coding and Computing (TTCC’04), Vol. 1, pp.107–115.
-
(2004)
International Conference on Information Technology: Coding and Computing (TTCC’04)
, vol.1
, pp. 107-115
-
-
Deng, H.1
Mukherjee, A.2
Agrawal, D.P.3
-
6
-
-
0017018484
-
New directions in cryptography
-
IT-22
-
Diffie, W. and Hellman, M.E. (1976) ‘New directions in cryptography’, IEEE Transactions Information Theory, IT-22, Vol. 6, pp.644–654.
-
(1976)
IEEE Transactions Information Theory
, vol.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
7
-
-
35248866223
-
Certificate-based encryption and the certificate revocation problem
-
LNCS 2656
-
Gentry, C. (2003) ‘Certificate-based encryption and the certificate revocation problem’, Advances in Cryptology-EUROCRYPT’ 2003, LNCS 2656, pp.272–293.
-
(2003)
Advances in Cryptology-EUROCRYPT’ 2003
, pp. 272-293
-
-
Gentry, C.1
-
8
-
-
35248867510
-
Efficient identity based signature schemes based on pairings’, Selected
-
LNCS 2595
-
Hess, F. (2003) ‘Efficient identity based signature schemes based on pairings’, Selected Areas in Cryptography (SAC) 2003, LNCS 2595, pp.310–324.
-
(2003)
Areas in Cryptography (SAC) 2003
, pp. 310-324
-
-
Hess, F.1
-
10
-
-
33749611163
-
-
Technical Report CACR 2006–04, Centre for Applied Cryptographic Research, University of Waterloo, Canada
-
Hoeper, K. and Gong, G. (2006) ‘Bootstrapping security in mobile ad hoc networks using identity-based schemes with key revocation’, Technical Report CACR 2006–04, Centre for Applied Cryptographic Research, University of Waterloo, Canada.
-
(2006)
Bootstrapping security in mobile ad hoc networks using identity-based schemes with key revocation
-
-
Hoeper, K.1
Gong, G.2
-
11
-
-
84943807207
-
Toward secure key distribution in truly ad-hoc networks
-
ISBN 0–7695-1873–7
-
Khalili, A., Katz, J. and Arbaugh, W. (2003) ‘Toward secure key distribution in truly ad-hoc networks’, 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), IEEE Computer Society, ISBN 0–7695-1873–7, pp.342–346.
-
(2003)
2003 Symposium on Applications and the Internet Workshops (SAINT 2003), IEEE Computer Society
, pp. 342-346
-
-
Khalili, A.1
Katz, J.2
Arbaugh, W.3
-
12
-
-
24744440154
-
Secure key issuing in ID-based cryptography
-
Australian Computer Society Inc.
-
Lee, B., Boyd, C., Dawson, E., Kim, K., Yang, J. and Yoo, S. (2004) ‘Secure key issuing in ID-based cryptography’, CRPIT ’04: Australasian Information Security, Data Mining and Web Intelligence and Software Internationalisation, Vol. 32, Australian Computer Society Inc., pp.69–74.
-
(2004)
CRPIT ’04: Australasian Information Security, Data Mining and Web Intelligence and Software Internationalisation
, vol.32
, pp. 69-74
-
-
Lee, B.1
Boyd, C.2
Dawson, E.3
Kim, K.4
Yang, J.5
Yoo, S.6
-
13
-
-
33646851075
-
How to solve key escrow and identity revocation in identity-based encryption schemes
-
LNCS 3803
-
Oh, J.H., Lee, K.K. and Moon, S-J. (2005) ‘How to solve key escrow and identity revocation in identity-based encryption schemes’, First International Conference Information Systems Security (ICISS 2005), LNCS 3803, pp.290–303.
-
(2005)
First International Conference Information Systems Security (ICISS 2005)
, pp. 290-303
-
-
Oh, J.H.1
Lee, K.K.2
Moon, S.-J.3
-
14
-
-
1642414982
-
Cryptography from pairings: a snapshot of current research
-
Paterson, K.G. (2002) ‘Cryptography from pairings: a snapshot of current research’, Information Security Technical Report, Vol. 7, No. 3, pp.41–54.
-
(2002)
Information Security Technical Report
, vol.7
, Issue.3
, pp. 41-54
-
-
Paterson, K.G.1
-
15
-
-
34347349933
-
Ad-hoc on-demand distance vector routing’, WMCSA
-
Perkins, C.E. and Royer, E.M. (1999) ‘Ad-hoc on-demand distance vector routing’, WMCSA ’99: Second IEEE Workshop onMobile Computer Systems and Applications, IEEE Computer Society, pp.90–100.
-
(1999)
’99: Second IEEE Workshop onMobile Computer Systems and Applications, IEEE Computer Society
, pp. 90-100
-
-
Perkins, C.E.1
Royer, E.M.2
|