-
1
-
-
0345490607
-
Certificateless public key cryptography," Proceedings of ASI- ACRYPT 2003
-
Springer- Verlag
-
S. S. Al-Riyami and K. G. Paterson, "Certificateless public key cryptography," Proceedings of ASI- ACRYPT 2003, LNCS 2894, pp. 452-473, Springer- Verlag, 2003.
-
(2003)
LNCS 2894
, pp. 452-473
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
2
-
-
33744818520
-
Certificateless public key cryptography
-
Report 2003/126
-
S. S. Al-Riyami and K. G. Paterson, "Cer- tificateless public key cryptography," Cryptology ePrint Archive, Report 2003/126, 2003. (http://eprint.iacr.org/)
-
(2003)
Cryptology ePrint Archive
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
3
-
-
24144438230
-
CBE from CLPKE: A generic construction and efficient schemes
-
LNCS 3386
-
S. S. Al-Riyami and K. G. Paterson. "CBE from CLPKE: A generic construction and efficient schemes," Proceedings PKC 2005, LNCS 3386, pp. 398-415, Springer-Verlag, Berlin, 2005.
-
(2005)
Proceedings PKC
, pp. 398-415
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
4
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
2442 Springer-Verlag
-
P. Barreto, H. Y. Kim, B. Bynn and M. Scott, "Efficient algorithms for pairing-based cryptosystems," Proceedings of CRYPTO 2002, LNCS 2442 Springer-Verlag, pp. 354- 368 2002.
-
(2002)
Proceedings of CRYPTO
-
-
Barreto, P.1
Kim, H.Y.2
Bynn, B.3
Scott, M.4
-
5
-
-
35048900981
-
On the selection of pairing-friendly groups
-
LNCS 3006
-
P. Barreto, B. Lynn, and M. Scott, "On the selection of pairing-friendly groups," Proceedings of SAC 2003, LNCS 3006, pp. 17-25, Springer-Verlag, 2004
-
(2004)
Proceedings of SAC 2003
, pp. 17-25
-
-
Barreto, P.1
Lynn, B.2
Scott, M.3
-
6
-
-
84949221411
-
Authenticated Diffie-Hellman key agreement protocols
-
LNCS 1556 Springer- Verlag
-
S. Blake-Wilson and A. Menezes, "Authenticated Diffie-Hellman key agreement protocols," Proceedings of SAC 1998, LNCS 1556 Springer- Verlag, pp. 339-361, 1999.
-
(1999)
Proceedings of SAC 1998
, pp. 339-361
-
-
Blake-Wilson, S.1
Menezes, A.2
-
7
-
-
84874324906
-
Identity-based encryption from theWeil pairing
-
Springer-Verlag LNCS 2139
-
D. Boneh and M. Franklin, "Identity-based encryption from theWeil pairing," Proceedings of CRYPTO 2001, Springer-Verlag LNCS 2139, pp. 213-229, 2001.
-
(2001)
Proceedings of CRYPTO 2001
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
9
-
-
35148821516
-
User-friendly grid security architecture and protocols
-
Cambridge, UK
-
L. Chen, H. W. Lim, and W. Mao, "User-friendly grid security architecture and protocols," Proceedings of the 13th International Workshop on Security Protocols, Cambridge, UK, 2005.
-
(2005)
Proceedings of the 13th International Workshop on Security Protocols
-
-
Chen, L.1
Lim, H.W.2
Mao, W.3
-
10
-
-
33646180371
-
On session key construction in provably secure protocols
-
Springer-Verlag LNCS 3715
-
K. K. R. Choo, C. Boyd, and Y. Hitchcock, "On session key construction in provably secure protocols," Proceedings of MYCRYPT 2005, Springer-Verlag LNCS 3715, pp. 116-131,2005.
-
(2005)
Proceedings of MYCRYPT
, pp. 116-131
-
-
Choo, K.K.R.1
Boyd, C.2
Hitchcock, Y.3
-
11
-
-
0017018484
-
New directions in cryptography
-
W. Diffie, and M. E. Hellman. "New directions in cryptography," IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644-654, 1976.
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
12
-
-
0036471031
-
The Grid: A new infrastructure for 21st century science
-
I. Foster, "The Grid: A new infrastructure for 21st century science," Physics Today, vol. 55, no. 2, pp. 42-47, 2002.
-
(2002)
Physics Today
, vol.55
, Issue.2
, pp. 42-47
-
-
Foster, I.1
-
13
-
-
84874954194
-
The Grid 2: Blueprint for a new computing infrastructure
-
I. Foster, and C. Kesselman, The Grid 2: Blueprint for a new computing infrastructure, Elsevier, San Francisco, 2004.
-
(2004)
Elsevier, San Francisco
-
-
Foster, I.1
Kesselman, C.2
-
14
-
-
0032218229
-
A security architecture for Computational Grids
-
I. Foster, C. Kesselman, G. Tsudik, and S. Tuecke, "A security architecture for Computational Grids," Proceedings of 5th ACM Conference on Computer and Communications Security, pp. 83-92, 1998.
-
(1998)
Proceedings of 5th ACM Conference on Computer and Communications Security
, pp. 83-92
-
-
Foster, I.1
Kesselman, C.2
Tsudik, G.3
Tuecke, S.4
-
15
-
-
2442621633
-
The SSL Protocol
-
Version 3.0, INTERNET-DRAFT
-
A. O. Freier, P. Karlton, and P. C. Kocher, The SSL Protocol, Version 3.0, INTERNET-DRAFT,1996.
-
(1996)
-
-
Freier, A.O.1
Karlton, P.2
Kocher, P.C.3
-
16
-
-
0041291986
-
Internet X.509 Public Key Infrastructure Certificate And Certificate Revocation List (CRL) Profile
-
(IETF), RFC
-
R. Housley, W. Polk, W. Ford, and D. Solo Internet X.509 Public Key Infrastructure Certificate And Certificate Revocation List (CRL) Profile, The Internet Engineering Task Force (IETF), RFC 2002.
-
(2002)
The Internet Engineering Task Force
-
-
Housley, R.1
Polk, W.2
Ford, W.3
Solo, D.4
-
17
-
-
84874985069
-
-
ITU-T, Recommendation X.509 the Directory- Au- thentication Framework, International Telecommunication Union, Geneva, Switzerland
-
ITU-T, Recommendation X.509 the Directory-Au- thentication Framework, International Telecommunication Union, Geneva, Switzerland. 1993.
-
(1993)
-
-
-
18
-
-
24644510922
-
An Identity-Based Non-Interactive Authentication Framework For Computational Grids
-
HPL-TR-2004-96
-
W. Mao, An Identity-Based Non-Interactive Authentication Framework For Computational Grids, HP Laboratories Bristol, HPL-TR-2004-96, 2004.
-
(2004)
HP Laboratories Bristol
-
-
Mao, W.1
-
19
-
-
84944878354
-
Hand- book of Applied Cryptography
-
CRC Press
-
A. Menezes, P. v. Oorschot, and S. Vanstone, Hand-book of Applied Cryptography, CRC Press, 1997.
-
(1997)
-
-
Menezes, A.1
Oorschot, P.2
Vanstone, S.3
-
20
-
-
0032069870
-
Key control in key agreement protocols
-
C. Mitchell, M. Ward, and P. Wilson, "Key control in key agreement protocols," Electronics Letters, vol. 34, no. 10, pp. 980-981, 1998.
-
(1998)
Electronics Letters
, vol.34
, Issue.10
, pp. 980-981
-
-
Mitchell, C.1
Ward, M.2
Wilson, P.3
-
21
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
LNCS 196
-
A. Shamir, "Identity-based cryptosystems and signature schemes," Proceedings of CRYPTO 1984, LNCS 196, pp. 47-53, Springer-Verlag, 1984.
-
(1984)
Proceedings of CRYPTO 1984
, pp. 47-53
-
-
Shamir, A.1
-
22
-
-
33645584388
-
Generic construction of certificateless encryption
-
Springer-Verlag LNCS 3043
-
D. H. Yum, and P. J. Lee, "Generic construction of certificateless encryption," Proceedings of ICCSA 2004, Springer-Verlag LNCS 3043, pp. 802-8112004.
-
(2004)
Proceedings of ICCSA 2004
, pp. 802-811
-
-
Yum, D.H.1
Lee, P.J.2
|