메뉴 건너뛰기




Volumn , Issue , 2011, Pages 1-6

Towards name-based trust and security for content-centric network

Author keywords

[No Author keywords available]

Indexed keywords

CONTENT INTEGRITY; CONTENT NETWORK; FUTURE INTERNET ARCHITECTURE; HYBRID SCHEME; IDENTITY BASED CRYPTOGRAPHY; OPEN SOURCE PROJECTS; PUBLIC KEY CERTIFICATES; PUBLIC KEYS; PUBLIC-KEY INFRASTRUCTURE; TRUST AND SECURITY;

EID: 84055178945     PISSN: 10921648     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICNP.2011.6089053     Document Type: Conference Paper
Times cited : (76)

References (18)
  • 6
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • Proc. of Eurocrypt
    • D. Boneh, E. Goh, and X. Boyen. Hierarchical identity based encryption with constant size ciphertext. In Proc. of Eurocrypt, LNCS 3493, 2005.
    • (2005) LNCS , vol.3493
    • Boneh, D.1    Goh, E.2    Boyen, X.3
  • 8
    • 1642407903 scopus 로고    scopus 로고
    • Effiecent identity based signature schemes based on pairings
    • F. Hess. Effiecent identity based signature schemes based on pairings. In Proc. of ACM SAC, 2002.
    • Proc. of ACM SAC, 2002
    • Hess, F.1
  • 13
    • 52149087712 scopus 로고    scopus 로고
    • An identity-based key agreement protocol for the network layer
    • Security and Cryptography for Networks
    • C. Schridde, M. Smith, and B. Freisleben. An identity-based key agreement protocol for the network layer. In Security and Cryptography for Networks, volume 5229 of LNCS, pages 409-422. 2008.
    • (2008) LNCS , vol.5229 , pp. 409-422
    • Schridde, C.1    Smith, M.2    Freisleben, B.3
  • 14
    • 0001827537 scopus 로고    scopus 로고
    • Identity-based cryptosystems and signature schemes
    • A. Shamir. Identity-based cryptosystems and signature schemes. In Proc. of CRYPTO, 1985.
    • Proc. of CRYPTO, 1985
    • Shamir, A.1
  • 15
    • 84910623624 scopus 로고    scopus 로고
    • Domain-based authentication of identity-based cryptosystems for secure email and ipsec
    • D. K. Smetters and G. Durfee. Domain-based authentication of identity-based cryptosystems for secure email and ipsec. In Proc. of Usenix Security Symposium, 2003.
    • Proc. of Usenix Security Symposium, 2003
    • Smetters, D.K.1    Durfee, G.2
  • 17
    • 70350654576 scopus 로고    scopus 로고
    • Securing mobile phone calls with identity-based cryptography
    • Advances in Information Security and Assurance
    • M. Smith and et al. Securing mobile phone calls with identity-based cryptography. In Advances in Information Security and Assurance, volume 5576 of LNCS, pages 210-222. 2009.
    • (2009) LNCS , vol.5576 , pp. 210-222
    • Smith, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.