-
2
-
-
19944419801
-
Performance comparison of security mechanisms for grid services
-
Pittsburgh, 2004-11-8
-
S. Shirasuna, A. Slominski, L. Fang, D. Gannon, Performance Comparison of Security Mechanisms for Grid Services, the 5th IEEE/ACM International Workshop on Grid Computing. Pittsburgh, 2004-11-8.
-
5th IEEE/ACM International Workshop on Grid Computing
-
-
Shirasuna, S.1
Slominski, A.2
Fang, L.3
Gannon, D.4
-
3
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Springer-Verlag
-
A. Shamir, Identity-based cryptosystems and signature schemes, in Advances in Cryptology - Crypto '84, Lecture Notes in Computer Science, Vol. 196, Springer-Verlag, pp. 47-53, 1984.
-
(1984)
Advances in Cryptology - Crypto '84, Lecture Notes in Computer Science
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
4
-
-
35248897599
-
-
In Eli Biham, editor, Eurocrypt 2003, volume 2656 of LNCS. Springer
-
R. Canetti, S. Halevi, and J. Katz. A forward-secure public-key encryption scheme. In Eli Biham, editor, Eurocrypt 2003, volume 2656 of LNCS. Springer,2003.
-
(2003)
A Forward-secure Public-key Encryption Scheme
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
-
5
-
-
33745854208
-
Chosenciphertext security from identity-based encryption
-
D. Boneh, R. Canetti, S. Halevi, and J. Katz. Chosenciphertext security from identity-based encryption. SIAM J. of Computing (SICOMP), 36(5):915-942, 2006.
-
(2006)
SIAM J. of Computing (SICOMP)
, vol.36
, Issue.5
, pp. 915-942
-
-
Boneh, D.1
Canetti, R.2
Halevi, S.3
Katz, J.4
-
8
-
-
34548774576
-
Multi-dimensional range query over encrypted data
-
E. Shi, J. Bethencourt, T.H. Hubert Chan, D. Song, and A. Perrig. Multi-dimensional range query over encrypted data. In IEEE Conference on Security and Privacy, 2007.
-
(2007)
IEEE Conference on Security and Privacy
-
-
Shi, E.1
Bethencourt, J.2
Hubert Chan, T.H.3
Song, D.4
Perrig, A.5
-
9
-
-
0037623983
-
Identity-based encryption from the Weil pairing
-
extended abstract in Crypto 2001
-
D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. SIAM J. of Computing, 32(3):586-615, 2003. extended abstract in Crypto 2001.
-
(2003)
SIAM J. of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
14
-
-
84887853842
-
A community authorization service for group collaboration
-
L. Pearlman, V. Welch, I. Foster, C. Kesselman, S. Tuecke, A Community Authorization Service for Group Collaboration. IEEE 3rd International Workshop on Policies for Distributed Systems and Networks, 2002.
-
(2002)
IEEE 3rd International Workshop on Policies for Distributed Systems and Networks
-
-
Pearlman, L.1
Welch, V.2
Foster, I.3
Kesselman, C.4
Tuecke, S.5
-
15
-
-
0003233442
-
Certificate-based access control for widely distributed resources
-
M. Thompson, W. J. S. Mudumbai, G. Hoo, K. Jackson, A. Essiari, Certificate-based Access Control for Widely Distributed Resources, in Proc. 8th Usenix Security Symposium. 1999.
-
(1999)
Proc. 8th Usenix Security Symposium
-
-
Thompson, M.1
Mudumbai, W.J.S.2
Hoo, G.3
Jackson, K.4
Essiari, A.5
-
16
-
-
2942654406
-
Certificate-based authorization policy in a pki environment
-
M. Thompson, A. Essiari, S. Mudumbai, Certificate-based Authorization Policy in a PKI Environment, ACM Transactions on Infomation and System Security (TISSEC), Volume 6, Issue 4, pp. 566-588, 2003-11.
-
(2003)
ACM Transactions on Infomation and System Security (TISSEC)
, vol.6
, Issue.4
, pp. 566-588
-
-
Thompson, M.1
Essiari, A.2
Mudumbai, S.3
-
18
-
-
84937422374
-
The security of chaffing and winnowing
-
M. Bellare, A. Boldyreva, The Security of Chaffing and Winnowing, Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, Lecture Notes In Computer Science, vol. 1976, pp.517-530, 2000
-
(2000)
Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, Lecture Notes in Computer Science
, vol.1976
, pp. 517-530
-
-
Bellare, M.1
Boldyreva, A.2
-
19
-
-
79952748410
-
A Mediated rsa-based end entity certificates revocation mechanism with secure concerned in grid
-
Weifeng Sun, Juanyun Wang, Boxiang Dong, Mingchu Li, Zhenquan Qin, A Mediated RSA-based End Entity Certificates Revocation Mechanism with Secure Concerned in Grid, IJIPM: International Journal of Information Processing and Management, Vol. 1, No. 2, pp. 103-114, 2010
-
(2010)
IJIPM: International Journal of Information Processing and Management
, vol.1
, Issue.2
, pp. 103-114
-
-
Sun, W.1
Wang, J.2
Dong, B.3
Li, M.4
Qin, Z.5
-
20
-
-
78651596385
-
An improved fuzzy identity-based encryption scheme with constant size ciphertext
-
Wenbo Shi, Injoo Jang, Hyeong Seon Yoo, An Improved Fuzzy Identity-Based Encryption Scheme With Constant Size Ciphertext, JDCTA: International Journal of Digital Content Technology and its Applications, Vol. 4, No. 4, pp. 7 ~ 14, 2010
-
(2010)
JDCTA: International Journal of Digital Content Technology and Its Applications
, vol.4
, Issue.4
, pp. 7-14
-
-
Shi, W.1
Jang, I.2
Yoo, H.S.3
-
21
-
-
78651574229
-
Efficient and identity-based signcryption with provably-secure
-
Yiling Wen, Jianfeng Ma, SangJae Moon, Efficient and Identity-based Signcryption with Provably-secure, JDCTA: International Journal of Digital Content Technology and its Applications, Vol. 4, No. 7, pp. 148 ~ 153, 2010
-
(2010)
JDCTA: International Journal of Digital Content Technology and Its Applications
, vol.4
, Issue.7
, pp. 148-153
-
-
Wen, Y.1
Ma, J.2
Moon, S.3
-
22
-
-
78651563192
-
A privacy-preserving mutual authentication protocol for vehicle ad hoc networks
-
Zuowen Tan, A Privacy-Preserving Mutual Authentication Protocol for Vehicle Ad Hoc Networks, JCIT: Journal of Convergence Information Technology, Vol. 5, No. 7, pp. 180-186, 2010
-
(2010)
JCIT: Journal of Convergence Information Technology
, vol.5
, Issue.7
, pp. 180-186
-
-
Tan, Z.1
-
23
-
-
78651596385
-
An improved fuzzy identity-based encryption scheme with constant size ciphertext
-
Wenbo Shi, Injoo Jang, Hyeong Seon Yoo, An Improved Fuzzy Identity-Based Encryption Scheme With Constant Size Ciphertext, JDCTA, Vol. 4, No. 4, pp. 7-14, 2010
-
(2010)
JDCTA
, vol.4
, Issue.4
, pp. 7-14
-
-
Shi, W.1
Jang, I.2
Yoo, H.S.3
|