-
3
-
-
77958454798
-
Persona: An online social network with user-defined privacy
-
R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin. Persona: An online social network with user-defined privacy. In Proc. of SIGCOMM, 2009.
-
Proc. of SIGCOMM, 2009
-
-
Baden, R.1
Bender, A.2
Spring, N.3
Bhattacharjee, B.4
Starin, D.5
-
6
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
Proc. of Eurocrypt
-
D. Boneh, E. Goh, and X. Boyen. Hierarchical identity based encryption with constant size ciphertext. In Proc. of Eurocrypt, LNCS 3493, 2005.
-
(2005)
LNCS
, vol.3493
-
-
Boneh, D.1
Goh, E.2
Boyen, X.3
-
8
-
-
1642407903
-
Effiecent identity based signature schemes based on pairings
-
F. Hess. Effiecent identity based signature schemes based on pairings. In Proc. of ACM SAC, 2002.
-
Proc. of ACM SAC, 2002
-
-
Hess, F.1
-
9
-
-
76749083002
-
Networking named content
-
V. Jacobson, D. K. Smetters, J. D. Thornton, M. F. Plass, N. H. Briggs, and R. L. Braynard. Networking named content. In Proc. of ACM CoNEXT, 2009.
-
Proc. of ACM CoNEXT, 2009
-
-
Jacobson, V.1
Smetters, D.K.2
Thornton, J.D.3
Plass, M.F.4
Briggs, N.H.5
Braynard, R.L.6
-
10
-
-
76749132819
-
Voccn: Voice over content-centric networks
-
V. Jacobsonn, D. K. Smetterss, N. Briggs, M. Plass, and P. Stewart. Voccn: voice over content-centric networks. In Proc. of ACM Workshop on Re-architecting the Internet, 2009.
-
Proc. of ACM Workshop on Re-architecting the Internet, 2009
-
-
Jacobsonn, V.1
Smetterss, D.K.2
Briggs, N.3
Plass, M.4
Stewart, P.5
-
11
-
-
74549116447
-
Lipsin: Line speed publish/subscribe inter-networking
-
P. Jokela, A. Zahemszky, S. Arianfar, P. Nikander, and C. Esteve. Lipsin: line speed publish/subscribe inter-networking. In Proc. of ACM SIGCOMM, 2009.
-
Proc. of ACM SIGCOMM, 2009
-
-
Jokela, P.1
Zahemszky, A.2
Arianfar, S.3
Nikander, P.4
Esteve, C.5
-
12
-
-
36949039907
-
A data-oriented (and beyond) network architecture
-
T. Koponen, M. Chawla, B.-G. Chun, A. Ermolinskiy, K. H. Kim, S. Shenker, and I. Stoica. A data-oriented (and beyond) network architecture. In Proc. of ACM SIGCOMM, 2007.
-
Proc. of ACM SIGCOMM, 2007
-
-
Koponen, T.1
Chawla, M.2
Chun, B.-G.3
Ermolinskiy, A.4
Kim, K.H.5
Shenker, S.6
Stoica, I.7
-
13
-
-
52149087712
-
An identity-based key agreement protocol for the network layer
-
Security and Cryptography for Networks
-
C. Schridde, M. Smith, and B. Freisleben. An identity-based key agreement protocol for the network layer. In Security and Cryptography for Networks, volume 5229 of LNCS, pages 409-422. 2008.
-
(2008)
LNCS
, vol.5229
, pp. 409-422
-
-
Schridde, C.1
Smith, M.2
Freisleben, B.3
-
14
-
-
0001827537
-
Identity-based cryptosystems and signature schemes
-
A. Shamir. Identity-based cryptosystems and signature schemes. In Proc. of CRYPTO, 1985.
-
Proc. of CRYPTO, 1985
-
-
Shamir, A.1
-
15
-
-
84910623624
-
Domain-based authentication of identity-based cryptosystems for secure email and ipsec
-
D. K. Smetters and G. Durfee. Domain-based authentication of identity-based cryptosystems for secure email and ipsec. In Proc. of Usenix Security Symposium, 2003.
-
Proc. of Usenix Security Symposium, 2003
-
-
Smetters, D.K.1
Durfee, G.2
-
17
-
-
70350654576
-
Securing mobile phone calls with identity-based cryptography
-
Advances in Information Security and Assurance
-
M. Smith and et al. Securing mobile phone calls with identity-based cryptography. In Advances in Information Security and Assurance, volume 5576 of LNCS, pages 210-222. 2009.
-
(2009)
LNCS
, vol.5576
, pp. 210-222
-
-
Smith, M.1
|