-
3
-
-
82155180700
-
Security issues, challenges and solutions in the smart grid
-
submitted for publication
-
H. Son, H. Kim, J. Roh, and J. Park, "Security issues, challenges and solutions in the smart grid," KIEE J. Electr. Eng. Technol., 2011, submitted for publication.
-
(2011)
KIEE J. Electr. Eng. Technol.
-
-
Son, H.1
Kim, H.2
Roh, J.3
Park, J.4
-
4
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
A. Shamir, "Identity-based cryptosystems and signature schemes," in Proc. Adv. Cryptol., 1985, pp. 47-53.
-
(1985)
Proc. Adv. Cryptol.
, pp. 47-53
-
-
Shamir, A.1
-
5
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Advances in Cryptology - CRYPTO 2001
-
D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," in Proc. Adv. Cryptol.-CRYPTO 2001, pp. 213-229. (Pubitemid 33317917)
-
(2001)
Lecture Notes in Computer Science
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
35048835319
-
Secure identity based encryption without random oracles
-
D. Boneh and X. Boyen, "Secure identity based encryption without random oracles," in Proc. Adv. Cryptol.-CRYPTO 2004, pp. 443-459.
-
(2004)
Proc. Adv. Cryptol.-CRYPTO
, pp. 443-459
-
-
Boneh, D.1
Boyen, X.2
-
7
-
-
24944566040
-
Efficient Identity-Based Encryption without random oracles
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
B. Waters, "Efficient identity-based encryption without random oracles," in Proc. Adv. Cryptol.-EUROCRYPT 2005, pp. 114-127. (Pubitemid 41313949)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 114-127
-
-
Waters, B.1
-
8
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
C. Cocks, "An identity based encryption scheme based on quadratic residues," in Proc. 8th IMA Int. Conf. Cryptography Coding, 2001, pp. 360-363.
-
(2001)
Proc. 8th IMA Int. Conf. Cryptography Coding
, pp. 360-363
-
-
Cocks, C.1
-
9
-
-
24944554962
-
Fuzzy identity-based encryption
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
A. Sahai and B. Waters, "Fuzzy identity-based encryption," in Proc. Adv. Cryptol.-EUROCRYPT 2005, pp. 457-473. (Pubitemid 41313969)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
10
-
-
0347090658
-
Simple proof of security of the BB84 quantum key distribution protocol
-
P. Shor and J. Preskill, "Simple proof of security of the BB84 quantum key distribution protocol," Phys. Rev. Lett., vol. 85, no. 2, pp. 441-444, 2000.
-
(2000)
Phys. Rev. Lett.
, vol.85
, Issue.2
, pp. 441-444
-
-
Shor, P.1
Preskill, J.2
-
11
-
-
84943807207
-
Toward secure key distribution in truly ad-hoc networks
-
A. Khalili, J. Katz, and W. Arbaugh, "Toward secure key distribution in truly ad-hoc networks," in Proc. SAINTWorkshops, 2003, pp. 342-346.
-
(2003)
Proc. SAINTWorkshops
, pp. 342-346
-
-
Khalili, A.1
Katz, J.2
Arbaugh, W.3
-
15
-
-
0037194815
-
ID-based signatures from pairings on elliptic curves
-
K. Paterson, "ID-based signatures from pairings on elliptic curves," Electron. Lett., vol. 38, no. 18, pp. 1025-1026, 2002.
-
(2002)
Electron. Lett.
, vol.38
, Issue.18
, pp. 1025-1026
-
-
Paterson, K.1
-
17
-
-
85053572525
-
-
Kepco Kepco Rep. [Online]
-
Kepco, "Statistics of electric power in Korea," Kepco Rep., 2010 [Online]. Available: http://www.kepco.co.kr
-
(2010)
Statistics of Electric Power in Korea
-
-
-
18
-
-
82155180702
-
-
[Online]
-
Kepco [Online]. Available: http://www.kepco.co.kr
-
Kepco
-
-
-
20
-
-
82155199061
-
-
[Online]
-
Shamus Software [Online]. Available: http://www.shamus.ie/index. php?page=benchmarks
-
Shamus Software
-
-
-
21
-
-
38549176356
-
SFRIC: A secure fast roaming scheme in wireless LAN using ID-based cryptography
-
DOI 10.1109/ICC.2007.263, 4288934, 2007 IEEE International Conference on Communications, ICC'07
-
Y. Kim, W. Ren, J. Jo, Y. Jiang, and J. Zheng, "SFRIC: A secure fast roaming scheme in wireless LAN using ID-based cryptography," in Proc. IEEE Int. Conf. Commun. 2007 (ICC'07), pp. 1570-1575. (Pubitemid 351145759)
-
(2007)
IEEE International Conference on Communications
, pp. 1570-1575
-
-
Kim, Y.1
Ren, W.2
Jo, J.-Y.3
Yang, M.4
Jiang, Y.5
Zheng, J.6
|