-
1
-
-
77954625601
-
Efficient lattice (H)IBE in the standard model
-
In: Gilbert, H. (ed.), Springer, LNCS
-
Agrawal, S., Boneh, D., Boyen, X.: Efficient lattice (H)IBE in the standard model. In: Gilbert, H. (ed.), Advances in Cryptology-Proceedings of EUROCRYPT 2010553-572. Springer, LNCS 6110, June 2010
-
(2010)
Advances In Cryptology-Proceedings of EUROCRYPT
, pp. 553-572
-
-
Agrawal, S.1
Boneh, D.2
Boyen, X.3
-
2
-
-
33745683680
-
A survey on wireless grid computing
-
Ahuja, S.P., Myers, J.R.: A survey on wireless grid computing. J. Supercomput. 37(1), 3-21 (2006)
-
(2006)
J. Supercomput
, vol.37
, Issue.1
, pp. 3-21
-
-
Ahuja, S.P.1
Myers, J.R.2
-
3
-
-
0345490607
-
Certificateless public key cryptography
-
In: Laih, C.S. (ed.), Springer, LNCS
-
Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.S. (ed.), Advances in Cryptology Proceedings of ASIACRYPT 2003452-473. Springer, LNCS 2894, November 2003
-
(2003)
Advances In Cryptology Proceedings of ASIACRYPT
, pp. 452-473
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
4
-
-
14544292384
-
From gridmap-file to VOMS: Managing authorization in a Grid environment
-
Alfieri, R., Cecchini, R., Ciaschini, V., dell' Agnello, L., Frohner, Á., Lorentey, K., Spataro, F.: From gridmap-file to VOMS: managing authorization in a Grid environment. Futur. Gener. Comput. Syst. 21(4), 549-558 (2005)
-
(2005)
Futur. Gener. Comput. Syst
, vol.21
, Issue.4
, pp. 549-558
-
-
Alfieri, R.1
Cecchini, R.2
Ciaschini, V.3
dell'Agnello, L.4
Frohner, A.5
Lorentey, K.6
Spataro, F.7
-
5
-
-
48049108254
-
Practical hierarchical identity based encryption and signature schemes without random oracles
-
, Report 2006/368, December, Available at
-
Au, M.H., Liu, J.K., Yuen, T.H., Wong, D.S.: Practical hierarchical identity based encryption and signature schemes without random oracles.Cryptology ePrint Archive, Report 2006/368, December 2006. Available at http://eprint.iacr.org/2006/368
-
(2006)
Cryptology EPrint Archive
-
-
Au, M.H.1
Liu, J.K.2
Yuen, T.H.3
Wong, D.S.4
-
7
-
-
33847698965
-
Efficient pairing computation on supersingular abelian varieties. Des
-
Barreto, P.S.L.M., Galbraith, S.D., Ó'héigeartaigh, C., Scott M.: Efficient pairing computation on supersingular abelian varieties. Des. Codes Cryptogr. 42(3), 239-271 (2007)
-
(2007)
Codes Cryptogr
, vol.42
, Issue.3
, pp. 239-271
-
-
Barreto, P.S.L.M.1
Galbraith, S.D.2
Ó'héigeartaigh, C.3
Scott, M.4
-
8
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
In: Yung, M., (ed.), Springer, LNCS
-
Barreto, P.S.L.M., Kim, H.Y., Lynn, B., Scott, M.: Efficient algorithms for pairing-based cryptosystems. In: Yung, M., (ed.) Advances in Cryptology-Proceedings of CRYPTO 2002354-368. Springer, LNCS 2442 (2002)
-
(2002)
Advances In Cryptology-Proceedings of CRYPTO
, pp. 354-368
-
-
Barreto, P.S.L.M.1
Kim, H.Y.2
Lynn, B.3
Scott, M.4
-
9
-
-
22144434836
-
-
Basney, J., Humphrey, M., Welch, V.: The MyProxy online credential repository. J. Softw. Pract. Exp 35(9)817-826 (2005)
-
(2005)
The MyProxy Online Credential Repository. J. Softw. Pract. Exp
, vol.35
, Issue.9
, pp. 817-826
-
-
Basney, J.1
Humphrey, M.2
Welch, V.3
-
10
-
-
84949230533
-
Key agreement protocols and their security analysis
-
In: Darnell, M. (ed.), Springer, LNCS, December
-
Blake-Wilson, S., Johnson, D., Menezes, A.Key agreement protocols and their security analysis. In: Darnell, M. (ed.) Proceedings of the 6th IMA International Conference on Cryptography and Coding (IMA'97), 30-45. Springer, LNCS 1355, December 1997
-
(1997)
Proceedings of the 6th IMA International Conference On Cryptography and Coding (IMA'97)
, pp. 30-45
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
11
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
In: Cramer, R., (ed.), Springer, LNCS, May
-
Boneh, D., Boyen, X., Goh, E.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer, R., (ed.), Advances in Cryptology-Proceedings of EUROCRYPT 2005 440-456. Springer, LNCS 3494, May 2005
-
(2005)
Advances In Cryptology-Proceedings of EUROCRYPT 2005
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.3
-
12
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
In: Kilian, J. (ed.), Springer, LNCS, August
-
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.), Advances in Cryptology-Proceedings of CRYPTO 2001213-229. Springer, LNCS 2139, August 2001
-
(2001)
Advances In Cryptology-Proceedings of CRYPTO 2001
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
13
-
-
43149116953
-
Space-efficient identity based encryption without pairings
-
IEEE Computer Society Press, October
-
Boneh, D., Gentry, C., Hamburg, M.: Space-efficient identity based encryption without pairings. In: Proceedings of the 48th Annual Symposium on Foundations of Computer Science (FOCS 2007), pp. 647-57. IEEE Computer Society Press, October 2007
-
(2007)
Proceedings of the 48th Annual Symposium On Foundations of Computer Science (FOCS 2007)
, pp. 647-657
-
-
Boneh, D.1
Gentry, C.2
Hamburg, M.3
-
15
-
-
35248836120
-
Password interception in a SSL/TLS channel
-
In Boneh, D. (ed.), Springer, LNCS
-
Canvel, B., Hiltgen, A., Vaudenay, S., Vuagnoux, M.: Password interception in a SSL/TLS channel. In Boneh, D. (ed.), Advances in Cryptology-Proceedings of CRYPTO 2003583-599. Springer, LNCS 2729 (2003)
-
(2003)
Advances In Cryptology-Proceedings of CRYPTO 2003
, pp. 583-599
-
-
Canvel, B.1
Hiltgen, A.2
Vaudenay, S.3
Vuagnoux, M.4
-
16
-
-
0037303408
-
The PERMIS X.509 role based privilege management infrastructure
-
Chadwick, D.W., Otenko, A.: The PERMIS X.509 role based privilege management infrastructure. Futur. Gener. Comput. Syst. 19(2), 277-289 (2003)
-
(2003)
Futur. Gener. Comput. Syst
, vol.19
, Issue.2
, pp. 277-289
-
-
Chadwick, D.W.1
Otenko, A.2
-
17
-
-
38949159171
-
Investigating the limits of SOAP performance for scientific computing
-
IEEE Computer Society Press, July
-
Chiu, K., Govindaraju, M., Bramley, R.: Investigating the limits of SOAP performance for scientific computing. In: Proceedings of 11th IEEE Symposium on High Performance Distributed Computing, pp. 246-254. IEEE Computer Society Press, July 2002
-
(2002)
Proceedings of 11th IEEE Symposium On High Performance Distributed Computing
, pp. 246-254
-
-
Chiu, K.1
Govindaraju, M.2
Bramley, R.3
-
18
-
-
38349020106
-
A certificate-free grid security infrastructure supporting password-based user authentication
-
September
-
Crampton, J., Lim, H.W., Paterson, K.G., Price, G.: A certificate-free grid security infrastructure supporting password-based user authentication.Proceedings of the 6th Annual PKI R&D Workshop 2007103-118. NIST Interagency Report 7427, September 2007
-
(2007)
Proceedings of the 6th Annual PKI R&D Workshop 2007
, pp. 103-118
-
-
Crampton, J.1
Lim, H.W.2
Paterson, K.G.3
Price, G.4
-
20
-
-
0012683535
-
(Extensible Markup Language) XML-Signature syntax and processing
-
RFC 3275, March
-
Eastlake, D., Reagle, J.M., Solo, D.: (Extensible Markup Language) XML-Signature syntax and processing. The Internet Engineering Task Force (IETF). RFC 3275, March 2002
-
(2002)
The Internet EngiNeering Task Force (IETF)
-
-
Eastlake, D.1
Reagle, J.M.2
Solo, D.3
-
21
-
-
1542591506
-
-
Eastlake, D., Reagle, J.M. (eds.), December 2002. Available at
-
Eastlake, D., Reagle, J.M. (eds.) XML Encryption Syntax and Processing. December 2002. Available at e-linkurl http://www.w3.org/TR/ xmlenc-core//url/e-link
-
XML Encryption Syntax and Processing
-
-
-
22
-
-
0034581037
-
Ten risks of PKI: What you're not being told about public key infrastructure
-
Ellison, C., Schneier, B.: Ten risks of PKI: what you're not being told about public key infrastructureComput. Secur. J. 16(1), 1-7 (2000)
-
(2000)
Comput. Secur. J
, vol.16
, Issue.1
, pp. 1-7
-
-
Ellison, C.1
Schneier, B.2
-
23
-
-
0031153727
-
Globus: A metacomputing infrastructure toolkit
-
Foster, I., Kesselman, C.: Globus: a metacomputing infrastructure toolkit. Int. J. Supercomput. Appl. 11(2), 115-128 (1997)
-
(1997)
Int. J. Supercomput. Appl
, vol.11
, Issue.2
, pp. 115-128
-
-
Foster, I.1
Kesselman, C.2
-
25
-
-
0032218229
-
A security architecture for computational Grids
-
ACM Press, November
-
Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A security architecture for computational Grids. In: Proceedings of the 5th ACM Computer and Communications Security Conference (CCS'98), pp. 83-92. ACM Press, November 1998
-
(1998)
Proceedings of the 5th ACM Computer and Communications Security Conference (CCS'98)
, pp. 83-92
-
-
Foster, I.1
Kesselman, C.2
Tsudik, G.3
Tuecke, S.4
-
26
-
-
0035455653
-
The anatomy of the Grid: Enabling scalable virtual organizations
-
Foster, I., Kesselman, C., Tuecke, S.: The anatomy of the Grid: enabling scalable virtual organizations. Int. J. High Perform. Comput. Appl. 15(3), 200-222 (2001)
-
(2001)
Int. J. High Perform. ComPut. Appl
, vol.15
, Issue.3
, pp. 200-222
-
-
Foster, I.1
Kesselman, C.2
Tuecke, S.3
-
27
-
-
73849107877
-
A taxonomy of pairing-friendly elliptic curves
-
Freeman, D., Scott, M., Teske, E.: A taxonomy of pairing-friendly elliptic curves. J. Cryptol. 23(2), 224-280 (2010)
-
(2010)
J. Cryptol
, vol.23
, Issue.2
, pp. 224-280
-
-
Freeman, D.1
Scott, M.2
Teske, E.3
-
28
-
-
0032649638
-
The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems
-
Frey, G., Müller, M., Rück, H.: The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems. IEEE Trans. Inf. Theor. 45(5), 1717-1719 (1999)
-
(1999)
IEEE Trans. Inf. Theor
, vol.45
, Issue.5
, pp. 1717-1719
-
-
Frey, G.1
Müller, M.2
Rück, H.3
-
29
-
-
57049104588
-
UniversallycomposablesecurityanalysisofTLS
-
Springer, LNCS 5324, October,In:Baek,J.,Bao, F., Chen, K., Lai, X. (eds.)
-
Gajek, S., Manulis, M., Pereira, O., Sadeghi, A., Schwenk, J.: UniversallycomposablesecurityanalysisofTLS.In:Baek,J.,Bao, F., Chen, K., Lai, X. (eds.) Proceedings of the 2nd International Conference on Provable Security (ProvSec 2008)313-327. Springer, LNCS 5324, October 2008
-
(2008)
Proceedings of the 2nd International Conference On Provable Security (ProvSec 2008)
, pp. 313-327
-
-
Gajek, S.1
Manulis, M.2
Pereira, O.3
Sadeghi, A.4
Schwenk, J.5
-
30
-
-
84946832010
-
Supersingular curves in cryptography
-
In: Boyd, C., (ed), Springer, LNCS, December
-
Galbraith, S.D.: Supersingular curves in cryptography. In: Boyd, C., (ed), Advances in Cryptology-Proceedings of ASIACRYPT 2001495-513. Springer, LNCS 2248, December 2001
-
(2001)
Advances In Cryptology-Proceedings of ASIACRYPT 2001
, pp. 495-513
-
-
Galbraith, S.D.1
-
31
-
-
33746054375
-
Pairings
-
In: Blake, I.F., Seroussi, G., Smart, N.P., (eds.), Cambridge University, Cambridge Press, LMS
-
Galbraith, S.D.: Pairings. In: Blake, I.F., Seroussi, G., Smart, N.P., (eds.) Chapter 9 of Advances in Elliptic Curve Cryptography183-213. Cambridge University, Cambridge Press, LMS 317 (2005)
-
(2005)
Chapter 9 of Advances In Elliptic Curve Cryptography
, pp. 183-213
-
-
Galbraith, S.D.1
-
32
-
-
82955246861
-
Implementing the Tate pairing
-
In: Fieker, C., Kohel, D.R., (eds.), Springer, LNCS
-
Galbraith, S.D., Harrison, K., Soldera, D.: Implementing the Tate pairing. In: Fieker, C., Kohel, D.R., (eds.) Proceedings of the 5th International Symposium on Algorithmic Number Theory (ANTS-V)324-337. Springer, LNCS 2369 (2002)
-
(2002)
Proceedings of the 5th International Symposium On Algorithmic Number Theory (ANTS-V)
, pp. 324-337
-
-
Galbraith, S.D.1
Harrison, K.2
Soldera, D.3
-
33
-
-
53249117524
-
Pairings for cryptographers
-
Galbraith, S.D., Paterson, K.G., Smart, N.P.: Pairings for cryptographers. Discret. Appl. Math. 156(16), 3113-3121 (2008)
-
(2008)
Discret. Appl. Math
, vol.156
, Issue.16
, pp. 3113-3121
-
-
Galbraith, S.D.1
Paterson, K.G.2
Smart, N.P.3
-
34
-
-
70349557354
-
Hierarchical ID-based cryptography
-
In: Zheng, Y. (ed), Springer,LNCS2501,December
-
Gentry, C., Silverberg, A.: Hierarchical ID-based cryptography. In: Zheng, Y. (ed) Advances in Cryptology-Proceedings of ASIACRYPT2002,pp.548-566.Springer,LNCS2501,December 2002
-
(2002)
Advances In Cryptology-Proceedings of ASIACRYPT2002
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
35
-
-
0036684150
-
PKI: It's not dead, just resting
-
Gutmann, P.: PKI: it's not dead, just resting. IEEE Comput. 35(8), 41-49 (2002)
-
(2002)
IEEE Comput
, vol.35
, Issue.8
, pp. 41-49
-
-
Gutmann, P.1
-
36
-
-
0036788156
-
The UK e-Science core programme and the grid
-
Hey, T., Trefethen, A.E.: The UK e-Science core programme and the grid. Futur. Gener. Comput. Syst. 18(8), 1017-1031 (2002)
-
(2002)
Futur. Gener. Comput. Syst
, vol.18
, Issue.8
, pp. 1017-1031
-
-
Hey, T.1
Trefethen, A.E.2
-
37
-
-
84947242701
-
Towards hierarchical identity-based encryption
-
In: Knudsen, L.R. (ed.), Springer, LNCS 2332, May
-
Horwitz, J., Lynn, B.: Towards hierarchical identity-based encryption. In: Knudsen, L.R. (ed.) Advances in CryptologyProceedings of EUROCRYPT 2002 466-481. Springer, LNCS 2332, May 2002
-
(2002)
Advances In Cryptology-Proceedings of EUROCRYPT 2002
, pp. 466-481
-
-
Horwitz, J.1
Lynn, B.2
-
38
-
-
0011255177
-
Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile
-
RFC 3280, April
-
Housley, R., Polk, W., Ford, W., Solo, D.: Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile. The Internet Engineering Task Force (IETF). RFC 3280, April 2002
-
(2002)
The Internet Engineering Task Force (IETF)
-
-
Housley, R.1
Polk, W.2
Ford, W.3
Solo, D.4
-
39
-
-
24644466862
-
An identity-based grid security infrastructure model
-
In: Deng, R.H., Bao, F., Pang, H., Zhou, J., (eds.), Springer, LNCS 3439
-
Huang, X., Chen, L., Huang, L., Li, M.: An identity-based grid security infrastructure model. In: Deng, R.H., Bao, F., Pang, H., Zhou, J., (eds.) Proceedings of the 1st International Conference on Information Security Practice and Experience (ISPEC 2005) 314-325. Springer, LNCS 3439 (2005)
-
(2005)
Proceedings of the 1st International Conference On Information Security Practice and Experience (ISPEC 2005)
, pp. 314-325
-
-
Huang, X.1
Chen, L.2
Huang, L.3
Li, M.4
-
40
-
-
44949218700
-
-
Kemp,J.,Cantor,S.,Mishra,P.,Philpott,R.,Maler,E.(eds)., OASIS Standard 200503, March
-
Kemp,J.,Cantor,S.,Mishra,P.,Philpott,R.,Maler,E.(eds).Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) Version 2.0. OASIS Standard 200503, March 2005
-
(2005)
Assertions and Protocols For the OASIS Security Assertion Markup Language (SAML) Version 2.0
-
-
-
41
-
-
85084164300
-
Kerberized credential translation: A solution to web access control
-
August
-
Kornievskaia, O., Honeyman, P., Doster, B., Coffman, K.: Kerberized credential translation: A solution to web access control. Proceedings of the 10th USENIX Security Symposium 235-250, August2001
-
(2001)
Proceedings of the 10th USENIX Security Symposium
-
-
Kornievskaia, O.1
Honeyman, P.2
Doster, B.3
Coffman, K.4
-
42
-
-
84880901653
-
The order of encryption and authentication for protecting communications (or: How secure is SSL?)
-
In: Kilian, J., (ed.), Springer, LNCS 2139, August
-
Krawczyk, H.: The order of encryption and authentication for protecting communications (or: How secure is SSL?). In: Kilian, J., (ed.)AdvancesinCryptology-ProceedingsofCRYPTO2001 310-331. Springer, LNCS 2139, August 2001
-
(2001)
AdvancesinCryptology-ProceedingsofCRYPTO2001
, pp. 310-331
-
-
Krawczyk, H.1
-
43
-
-
33846324046
-
Identity-based cryptography for grid security
-
In: Stockinger, H., Buyya, R., Perrott, R. (eds.), IEEE Computer Society Press, December
-
Lim, H.W., Paterson, K.G.: Identity-based cryptography for grid security. In: Stockinger, H., Buyya, R., Perrott, R. (eds.) Proceedings of the 1st IEEE International Conference on e-Science and Grid Computing (e-Science 2005), pp. 395-404. IEEE Computer Society Press, December 2005
-
(2005)
Proceedings of the 1st IEEE International Conference On E-Science and Grid Computing (e-Science 2005)
, pp. 395-404
-
-
Lim, H.W.1
Paterson, K.G.2
-
44
-
-
35048897942
-
On identity-based cryptography and Grid computing
-
In: Bubak, M., Albada G.D.V., Sloot, P.M.A., Dongarra, J.J. (eds.), Springer, LNCS, June
-
Lim, H.W., Robshaw, M.J.B.: On identity-based cryptography and Grid computing. In: Bubak, M., Albada G.D.V., Sloot, P.M.A., Dongarra, J.J. (eds.) Proceedings of the 4th International Conference on Computational Science (ICCS 2004), 474-477. Springer, LNCS 3036, June 2004
-
(2004)
Proceedings of the 4th International ConFerence On Computational Science (ICCS 2004)
, pp. 474-477
-
-
Lim, H.W.1
Robshaw, M.J.B.2
-
45
-
-
0003451922
-
Generic security service application program interface version 2, update1
-
RFC 2743, January
-
Linn, J.: Generic security service application program interface version 2, update1. The Internet Engineering Task Force (IETF). RFC 2743, January 2000
-
(2000)
The Internet Engineering Task Force (IETF)
-
-
Linn, J.1
-
47
-
-
4344667426
-
Wireless grids: Distributed resource sharing by mobile, nomadic, and fixed devices
-
McKnight, L.W., Howison, J., Bradner, S.: Wireless grids: distributed resource sharing by mobile, nomadic, and fixed devices. IEEE Internet Comput. 8(4), 24-31 (2004)
-
(2004)
IEEE Internet Comput
, vol.8
, Issue.4
, pp. 24-31
-
-
McKnight, L.W.1
Howison, J.2
Bradner, S.3
-
48
-
-
78751644965
-
GSS-API Extensions
-
June 2004, Available at, last accessed in July
-
Meder, S., Welch, V., Tuecke, S., Engert, D.: GSS-API ExtensionsGlobal Grid Forum (GGF) Grid Security Infrastructure Working Group, June 2004. Available at e-linkurl http://www.ggf.org/documents/ GFD.24.pdf/url/e-link, last accessed in July 2007
-
(2007)
Global Grid Forum (GGF) Grid Security Infrastructure Working Group
-
-
Meder, S.1
Welch, V.2
Tuecke, S.3
Engert, D.4
-
49
-
-
58349099301
-
A modular security analysis of the TLS handshake protocol
-
In:Pieprzyk,J.,(ed.), Springer, LNCS 5350, December
-
Morrissey, P., Smart, N.P., Warinschi, B.: A modular security analysis of the TLS handshake protocol.In:Pieprzyk,J.,(ed.)Advances in Cryptology-Proceedings of ASIACRYPT 200855-73. Springer, LNCS 5350, December 2008
-
(2008)
Advances In Cryptology-Proceedings of ASIACRYPT 2008
, pp. 55-73
-
-
Morrissey, P.1
Smart, N.P.2
Warinschi, B.3
-
51
-
-
0028514601
-
Kerberos: An Authentication Service For Computer Networks
-
Neuman, B.C., Ts'o, T.Kerberos: an authentication service for computer networks. IEEE Commun. 32(9), 33-38 (1994)
-
(1994)
IEEE Commun
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.C.1
Ts'o, T.2
-
52
-
-
0034870062
-
An online credential repository for the Grid: MyProxy
-
IEEE Computer Society Press, August
-
Novotny, J., Tuecke, S., Welch, V.: An online credential repository for the Grid: MyProxy. In Proceedings of the 10th IEEE International Symposium on High Performance Distributed Computing (HPDC-10 2001), pp. 104-111. IEEE Computer Society Press, August (2001)
-
(2001)
Proceedings of the 10th IEEE InternaTional Symposium On High Performance Distributed Computing (HPDC-10 2001)
, pp. 104-111
-
-
Novotny, J.1
Tuecke, S.2
Welch, V.3
-
54
-
-
33746100516
-
Cryptography from pairings
-
In: Blake, I.F., Seroussi, G., Smart, N.P. (eds.), Cambridge, Cambridge University Press, LMS 317
-
Paterson, K.G.: Cryptography from pairings. In: Blake, I.F., Seroussi, G., Smart, N.P. (eds.) Chapter 10 of Advances in Elliptic Curve Cryptography, 215-251. Cambridge, 2005. Cambridge University Press, LMS 317
-
(2005)
Chapter 10 of Advances In Elliptic Curve Cryptography
, pp. 215-251
-
-
Paterson, K.G.1
-
55
-
-
1942473586
-
A comparison between traditional public key infrastructures and identity-based cryptography
-
Paterson, K.G., Price, G.: A comparison between traditional public key infrastructures and identity-based cryptography. Inf. Secur. Tech. Report. 8(3), 57-72 (2003)
-
(2003)
Inf. Secur. Tech. Report
, vol.8
, Issue.3
, pp. 57-72
-
-
Paterson, K.G.1
Price, G.2
-
56
-
-
85024252307
-
Inductive analysis of the Internet protocol TLS. ACM Tran
-
Paulson, L.C.: Inductive analysis of the Internet protocol TLS. ACM Tran. Inf. Syst. Secur. 2(3), 332-351 (1999)
-
(1999)
Inf. Syst. Secur
, vol.2
, Issue.3
, pp. 332-351
-
-
Paulson, L.C.1
-
57
-
-
84887853842
-
A community authorization service for group collaboration
-
IEEE Computer Society Press, June
-
Pearlman, L., Welch, V., Foster, I., Kesselman, C., Tuecke, S.: A community authorization service for group collaboration. In: Proceedings of the 3rd IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'02), pp. 50-59. IEEE Computer Society Press, June 2002
-
(2002)
Proceedings of the 3rd IEEE International Workshop On Policies For Distributed Systems and Networks (POLICY'02)
, pp. 50-59
-
-
Pearlman, L.1
Welch, V.2
Foster, I.3
Kesselman, C.4
Tuecke, S.5
-
59
-
-
33750908652
-
PKI Challenges: An Industry Analysis
-
Volume, of FAIA, IOS Press, In: Zhou, J., Kang, M-C., Bao, F., Pang, H.-H. (eds.)
-
Rice, G.: PKI challenges: An industry analysis. In: Zhou, J., Kang, M-C., Bao, F., Pang, H.-H. (eds.), Proceedings of the 4th International Workshop for Applied PKI (IWAP 2005), 3-16. Volume 128 of FAIA, IOS Press (2005)
-
(2005)
Proceedings of the 4th InternaTional Workshop For Applied PKI (IWAP 2005)
, vol.128
, pp. 3-16
-
-
Rice, G.1
-
62
-
-
85020598353
-
Identity-based Cryptosystems and Signature Schemes
-
Springer, LNCS 196, August, In:Blakley,G.R.,Chaum,D.(eds.)
-
Shamir, A.: Identity-based cryptosystems and signature schemes. In:Blakley,G.R.,Chaum,D.(eds.),AdvancesinCryptology-Proceedings of CRYPTO'84, 47-53. Springer, LNCS 196, August 1985
-
(1985)
AdvancesinCryptology-ProCeedings of CRYPTO'84
, pp. 47-53
-
-
Shamir, A.1
-
63
-
-
78751641696
-
Shamus Software Ltd
-
Available at
-
Shamus Software Ltd. MIRACL. Available at e-linkurl http://www.shamus.ie//url/e-link
-
MIRACL
-
-
-
64
-
-
19944419801
-
Performance comparison of security mechanisms for grid services
-
IEEE Computer Society Press, November
-
Shirasuna, S., Slominski, A., Fang, L., Gannon, D.: Performance comparison of security mechanisms for grid services. In: Proceedings of 5th IEEE/ACM International Workshop on Grid Computing (GRID2004), pp. 360-364. IEEE Computer Society Press, November 2004
-
(2004)
ProceedIngs of 5th IEEE/ACM International Workshop On Grid ComPuting (GRID2004)
, pp. 360-364
-
-
Shirasuna, S.1
Slominski, A.2
Fang, L.3
Gannon, D.4
-
65
-
-
2942654406
-
Certificate-based authorization policy in a PKI environment
-
Thompson, M.R., Essiari, A., Mudumbai, S.: Certificate-based authorization policy in a PKI environment. ACM Trans Inf. Syst. Secur. 6(4), 566-588 (2003)
-
(2003)
ACM Trans Inf. Syst. Secur
, vol.6
, Issue.4
, pp. 566-588
-
-
Thompson, M.R.1
Essiari, A.2
Mudumbai, S.3
-
66
-
-
0004001001
-
Internet X.509 public key infrastructure proxy certificate profile
-
RFC 3820, June
-
Tuecke, S., Welch, V., Engert, D., Pearlman, L., Thompson, M.R.: Internet X.509 public key infrastructure proxy certificate profile. The Internet Engineering Task Force (IETF). RFC 3820, June 2004
-
(2004)
The Internet Engineering Task Force (IETF)
-
-
Tuecke, S.1
Welch, V.2
Engert, D.3
Pearlman, L.4
Thompson, M.R.5
-
67
-
-
84947212539
-
Security Flaws Induced By CBC Padding-applications to SSL, IPSEC, WTLS
-
Springer, LNCS 2332, In: Knudsen, L.R. (ed.), Advances In
-
Vaudenay, S.: Security flaws induced by CBC padding-applications to SSL, IPSEC, WTLS.In: Knudsen, L.R. (ed.), Advances in Cryptology-Proceedings of EUROCRYPT 2002534-546. Springer, LNCS 2332 (2002)
-
(2002)
Cryptology-Proceedings of EUROCRYPT 2002
, pp. 534-546
-
-
Vaudenay, S.1
-
69
-
-
17644368658
-
X.509 proxy certificates for dynamic delegation
-
NIST Interagency Report, April
-
Welch, V., Foster, I., Kesselman, C., Mulmo, O., Pearlman, L., Tuecke, S., Gawor, J., Meder, S., Siebenlist, F.: X.509 proxy certificates for dynamic delegation. In: Proceedings of the 3rd Annual PKI R&D Workshop, pp. 42-58. NIST Interagency Report, April 2004
-
(2004)
Proceedings of the 3rd Annual PKI R&D Workshop
, pp. 42-58
-
-
Welch, V.1
Foster, I.2
Kesselman, C.3
Mulmo, O.4
Pearlman, L.5
Tuecke, S.6
Gawor, J.7
Meder, S.8
Siebenlist, F.9
-
70
-
-
84942318236
-
Security for Grid services
-
IEEE Computer Society Press, June
-
Welch, V., Siebenlist, F., Foster, I., Bresnahan, J., Czajkowski, K., Gawor, J., Kesselman, C., Meder, S., Pearlman, L., Tuecke, S.: Security for Grid services. In: Proceedings of the 12th IEEE International Symposium on High Performance Distributed Computing (HPDC-12 2003), pp. 48-61. IEEE Computer Society Press, June 2003
-
(2003)
Proceedings of the 12th IEEE InterNational Symposium On High Performance Distributed Computing (HPDC-12 2003)
, pp. 48-61
-
-
Welch, V.1
Siebenlist, F.2
Foster, I.3
Bresnahan, J.4
Czajkowski, K.5
Gawor, J.6
Kesselman, C.7
Meder, S.8
Pearlman, L.9
Tuecke, S.10
|