-
1
-
-
77649317330
-
-
Software as a Service, Jul. 2009
-
Software as a Service, http://en.wikipedia.org/wiki/SaaS,Jul. 2009.
-
-
-
-
2
-
-
77649300582
-
-
Sept. 2009
-
Saleforce System Secturity, http://trust.salesforce.com/trust/security/, Sept. 2009.
-
Saleforce System Secturity
-
-
-
5
-
-
0036684150
-
PKI:It's not Dead , Just Resting
-
Aug
-
P Guttman, "PKI:It's not Dead , Just Resting," IEEE Computer, vol. 35, Aug 2002, pp. 41-49.
-
(2002)
IEEE Computer
, vol.35
, pp. 41-49
-
-
Guttman, P.1
-
6
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Springer-Verlag New York
-
Adi Shamir, "Identity-based cryptosystems and signature schemes," Proc. Of CRYPTO 84 on Advances in Cryptology, Springer-Verlag New York,1985, pp. 47-53.
-
(1985)
Proc. Of CRYPTO 84 on Advances in Cryptology
, pp. 47-53
-
-
Shamir, A.1
-
7
-
-
0037623983
-
Identity-based Encryption from the Weil Pairing
-
Mar
-
Dan Boneh, Matthew K. Franklin, "Identity-based Encryption from the Weil Pairing," SIAM Journal on Computing, vol. 32 ,Mar. 2003, pp. 586-615.
-
(2003)
SIAM Journal on Computing
, vol.32
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.K.2
-
8
-
-
34648825634
-
New ID-Based Universal Designated-Verifier Signature Scheme
-
Aug
-
Wang Xiaofeng, Zhang Jing, Wang Shangping, Zhang Yaling, Qin Bo, "New ID-Based Universal Designated-Verifier Signature Scheme," Acta Electronica Sinia, vol. 35, Aug. 2007, pp. 1432-1436.
-
(2007)
Acta Electronica Sinia
, vol.35
, pp. 1432-1436
-
-
Wang, X.1
Jing, Z.2
Wang, S.3
Zhang, Y.4
Bo, Q.5
-
9
-
-
77649328644
-
New ID-based Universal Designated Multi-Verifiers Signature schem
-
Jul
-
Zhang Xuejun, "New ID-based Universal Designated Multi-Verifiers Signature schem," Engineering and Applications, vol 44, Jul. 2008, pp. 33-35
-
(2008)
Engineering and Applications
, vol.44
, pp. 33-35
-
-
Zhang, X.1
-
10
-
-
70349735426
-
-
Chen Jinjun,Yang Yun, Key Research Issues in Grid Workflow Verification and Validation. Proc. the 2006 Astralasian Workshop on Grid Computing and e-research, Australian Computer Socity, 2006, pp. 97-104.
-
Chen Jinjun,Yang Yun, "Key Research Issues in Grid Workflow Verification and Validation." Proc. the 2006 Astralasian Workshop on Grid Computing and e-research, Australian Computer Socity, 2006, pp. 97-104.
-
-
-
-
11
-
-
77649305345
-
A Java Implementation of an Elliptic Curve Cryptosystem
-
Computer Science press, Trinity College
-
Andrew Burnett, Keith Winters, Tom Dowling, "A Java Implementation of an Elliptic Curve Cryptosystem," Recent Advances in Java Technology, Computer Science press, Trinity College, 2002, pp. 83-88.
-
(2002)
Recent Advances in Java Technology
, pp. 83-88
-
-
Burnett, A.1
Winters, K.2
Dowling, T.3
-
12
-
-
84944878354
-
-
Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, Handbook of applied Cryptography, CRC Press LLC, 1997.
-
Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, Handbook of applied Cryptography, CRC Press LLC, 1997.
-
-
-
-
13
-
-
84937428623
-
Efficient Algorithms for Pairing-Based Crptosystems
-
Springer-Verlag
-
Paulo S. L. M. Barreto, Hae Yong Kim, Michael Scott, "Efficient Algorithms for Pairing-Based Crptosystems," Proc. The 22nd Annual International Cryptology Confence on Advances in Cryptology, Springer-Verlag, 2002, pp. 354-368.
-
(2002)
Proc. The 22nd Annual International Cryptology Confence on Advances in Cryptology
, pp. 354-368
-
-
Barreto, P.S.L.M.1
Yong Kim, H.2
Scott, M.3
|