-
1
-
-
35148881615
-
Internet 3.0: Ten Problems with Current Internet Architecture and Solutions for the Next Generation
-
R. Jain, "Internet 3.0: Ten Problems with Current Internet Architecture and Solutions for the Next Generation," Military Communications Conference MILCOM, Washington, DC, October 23-25, 2006
-
Military Communications Conference MILCOM, Washington, DC, October 2325 2006
-
-
Jain, R.1
-
2
-
-
33747651434
-
-
International Telecommunication Union (ITU), ITU Internet Reports, November
-
International Telecommunication Union (ITU), ITU Internet Reports, The Internet of Things, November 2005.
-
(2005)
The Internet of Things
-
-
-
4
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
A. Shamir, "Identity-based cryptosystems and signature schemes," Advances in Cryptology-CRYPTO'84, pp. 47-53, 2008.
-
(2008)
Advances in Cryptology-CRYPTO'84
, pp. 47-53
-
-
Shamir, A.1
-
5
-
-
0037623983
-
Identity-Based Encryption from the Weil Pairing
-
Dan Boneh and Mattew Franklin, "Identity-Based Encryption from the Weil Pairing," SIAM J., Vol. 32, No. 3, PP. 586-615, 2003.
-
(2003)
SIAM J.
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
Cramer R.J.F. (ed.) EUROCRYPT 2005 Springer, Heidelberg
-
Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114-127. Springer, Heidelberg 2005
-
(2005)
LNCS
, vol.3494
, pp. 114-127
-
-
Waters, B.1
-
7
-
-
38049004199
-
Chosen ciphertext secure identity-based encryption in the standard model with short ciphertexts
-
Report 2006/122
-
Kiltz, E.: Chosen ciphertext secure identity-based encryption in the standard model with short ciphertexts. Cryptology ePrint Archive, Report 2006/122 (2006)
-
(2006)
Cryptology EPrint Archive
-
-
Kiltz, E.1
-
8
-
-
0345490607
-
Certificateless public key cryptography
-
ASIACRYPT, of Springer
-
Sattam S. Al-Riyami and Kenneth G. Paterson, "Certificateless public key cryptography," ASIACRYPT,volume 2894 of Lecture Notes in Computer Science, pages 452-473. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2894
, pp. 452-473
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
12
-
-
77952809619
-
The Metalist Model: A simple and extensible information model for the Future Internet
-
To appear in the Barcelona, September
-
Eric Renault and Djamal Zeghlache "The Metalist Model: a simple and extensible information model for the Future Internet." To appear in the EUNICE 2009, Barcelona, 7-9 September, 2009.
-
(2009)
EUNICE 2009
, pp. 7-9
-
-
Renault, E.1
Zeghlache, D.2
-
14
-
-
77952793292
-
Translated from sibirskii Matematicheskii Zhurnal
-
May-June
-
A. G. Myasnikov, The theory of models of bilinear mappings, Omsk City. Translated from sibirskii Matematicheskii Zhurnal, Vol. 31, No. 3, pp. 94-108, May-June, 1990.
-
(1990)
The Theory of Models of Bilinear Mappings, Omsk City
, vol.31
, Issue.3
, pp. 94-108
-
-
Myasnikov, A.G.1
-
15
-
-
77952791606
-
Cryptanalysis of Two Pairing-Based Blind Signature Schemes Communication Technology, 2006
-
Jiyao Wang; Tianjie Cao; Cryptanalysis of Two Pairing-Based Blind Signature Schemes Communication Technology, 2006. ICCT '06. International Conference on 27-30 Nov. 2006 Page(s):1-3
-
ICCT '06. International Conference on 27-30 Nov. 2006
, pp. 1-3
-
-
Wang, J.1
Cao, T.2
-
16
-
-
84876300178
-
Malicious KGC attacks in certificateless cryptography
-
Man Ho Au, Yi Mu, Jing Chen, Duncan S. Wong, Joseph K. Liu, Guomin Yang, "Malicious KGC attacks in certificateless cryptography" ASIACCS '07: Proceedings of the 2nd ACM symposium on Information, computer and communications security,2007.
-
ASIACCS '07: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security,2007
-
-
Au, M.H.1
Mu, Y.2
Chen, J.3
Duncan, S.4
Liu, W.J.K.5
Yang, G.6
-
17
-
-
35048841300
-
Efficient selective-ID secure identity based encryption without random oracle
-
D. Boneh and X. Boyen, "Efficient selective-ID secure identity based encryption without random oracle," Advances in Cryptology-EUROCRYPTO'04, pp. 223-238, 2004
-
(2004)
Advances in Cryptology-EUROCRYPTO'04
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
18
-
-
33746370456
-
Key Replacement Attack Against a Generic Construction of Certificateless Signature
-
Bessie C. Hu, Duncan S. Wong, Zhenfeng Zhang and Xiaotie Deng, "Key Replacement Attack Against a Generic Construction of Certificateless Signature," ACISP'06, LNCS 4058, pp. 235-246, 2006.
-
(2006)
ACISP'06, LNCS 4058
, pp. 235-246
-
-
Bessie, C.1
Wong, H.D.S.2
Zhang, Z.3
Deng, X.4
|