-
1
-
-
33646695295
-
Practical Pay TV Schemes
-
Information Security and Privacy
-
A. Narayanan, C. P. Rangan, and K. Kim, "Practical pay TV schemes," in Proc. ACISP, LNCS 2727. 2003, pp. 192-203. (Pubitemid 36892634)
-
(2003)
Lecture Notes In Computer Science
, Issue.2727
, pp. 192-203
-
-
Narayanan, A.1
Rangan, C.P.2
Kim, K.3
-
2
-
-
70449094716
-
Secure content sharing using third party with broadcast encryption for stateless receivers
-
Aug
-
D. Chourishi, S. Seshadri, and D. Chourishi, "Secure content sharing using third party with broadcast encryption for stateless receivers," in Proc. IEEE Int. Conf. Comput. Sci. Informat. Technol., Aug. 2009, pp. 528-531.
-
(2009)
Proc IEEE Int. Conf. Comput. Sci. Informat. Technol.
, pp. 528-531
-
-
Chourishi, D.1
Seshadri, S.2
Chourishi, D.3
-
3
-
-
76349099365
-
A biometric encryption system for the self-exclusion scenario of face recognition
-
Dec
-
K. Martin, H. Lu, F. M. Bui, K. N. Plataniotis, and D. Hatzinakos, "A biometric encryption system for the self-exclusion scenario of face recognition," IEEE Syst. J., vol. 3, no. 4, pp. 440-450, Dec. 2009.
-
(2009)
IEEE Syst. J
, vol.3
, Issue.4
, pp. 440-450
-
-
Martin, K.1
Lu, H.2
Bui, F.M.3
Plataniotis, K.N.4
Hatzinakos, D.5
-
4
-
-
33745607344
-
A chosen ciphertext attack against several e-mail encryption protocols
-
J. Katz and B. Schneier, "A chosen ciphertext attack against several e-mail encryption protocols," in Proc. SSYM, 2000, p. 18.
-
(2000)
Proc. SSYM
, pp. 18
-
-
Katz, J.1
Schneier, B.2
-
5
-
-
33750065702
-
Privacy in encrypted content distribution using private broadcast encryption
-
Financial Cryptography and Data Security - 10th International Conference, FC 2006, Revised Selected Papers
-
A. Barth, D. Boneh, and B. Waters, "Privacy in encrypted content distribution using private broadcast encryption," in Proc. FC, LNCS 4107. 2006, pp. 52-64. (Pubitemid 44577277)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4107 LNCS
, pp. 52-64
-
-
Barth, A.1
Boneh, D.2
Waters, B.3
-
6
-
-
73449087675
-
Efficient secret broadcast in the broadcasting networks
-
Dec
-
I. R. Jeong, J. O. Kwon, and D. H. Lee, "Efficient secret broadcast in the broadcasting networks," IEEE Commun. Lett., vol. 13, no. 12, pp. 1001-1003, Dec. 2009.
-
(2009)
IEEE Commun. Lett
, vol.13
, Issue.12
, pp. 1001-1003
-
-
Jeong, I.R.1
Kwon, J.O.2
Lee, D.H.3
-
7
-
-
84861593834
-
Privacy-preserving identity-based broadcast encryption
-
J. Hur, C. Park, and S. O. Hwang, "Privacy-preserving identity-based broadcast encryption," Inform. Fusion, vol. 13, no. 4, pp. 296-303, 2012.
-
(2012)
Inform. Fusion
, vol.13
, Issue.4
, pp. 296-303
-
-
Hur, J.1
Park, C.2
Hwang, S.O.3
-
9
-
-
33646041813
-
Domain-based administration of identitybased cryptosystems for secure email and IPSEC
-
D. K. Smetters, G. Durfee, "Domain-based administration of identitybased cryptosystems for secure email and IPSEC," in Proc. SSYM, 2003, p. 15.
-
(2003)
Proc. SSYM
, pp. 15
-
-
Smetters, D.K.1
Durfee, G.2
-
10
-
-
0037623983
-
Identity-based encryption from the weil pairing
-
D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing," SIAM J. Computing, vol. 32, no. 3, pp. 586-615, 2003.
-
(2003)
SIAM J. Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
11
-
-
20444502239
-
An ID-based broadcast encryption scheme for key distribution
-
DOI 10.1109/TBC.2005.847600
-
X. Du, Y. Wang, J. Ge, and Y. Wang, "An ID-based broadcast encryption scheme for key distribution," IEEE Trans. Broadcast., vol. 51, no. 2, pp. 264-266, Jun. 2005. (Pubitemid 40819431)
-
(2005)
IEEE Transactions on Broadcasting
, vol.51
, Issue.2
, pp. 264-266
-
-
Du, X.1
Wang, Y.2
Ge, J.3
Wang, Y.4
-
12
-
-
36348947024
-
Comments on an efficient ID-based broadcast encryption scheme
-
Dec
-
H. Y. Chien, "Comments on an efficient ID-based broadcast encryption scheme," IEEE Trans. Broadcast., vol. 53, no. 4, pp. 809-810, Dec. 2007.
-
(2007)
IEEE Trans. Broadcast
, vol.53
, Issue.4
, pp. 809-810
-
-
Chien, H.Y.1
-
13
-
-
24144432124
-
Efficient multi-receiver identitybased encryption and its application to broadcast encryption
-
Proc. PKC
-
J. Baek, R. S. Naini, and W. Susilo, "Efficient multi-receiver identitybased encryption and its application to broadcast encryption," in Proc. PKC, LNCS 3386. 2005, pp. 23-26.
-
(2005)
LNCS
, vol.3386
, pp. 23-26
-
-
Baek, J.1
Naini, R.S.2
Susilo, W.3
-
14
-
-
85025586099
-
Multi-receiver identity-based key encapsulation with shortened ciphertext
-
Proc. Indocrypt
-
S. Chatterjee and P. Sarkar, "Multi-receiver identity-based key encapsulation with shortened ciphertext," in Proc. Indocrypt, LNCS 4329. 2006, pp. 394-408.
-
(2006)
LNCS
, vol.4329
, pp. 394-408
-
-
Chatterjee, S.1
Sarkar, P.2
-
15
-
-
38149117029
-
Identity-based broadcast ecryption with constant size ciphertexts and private keys
-
Proc. ASIACRYPT
-
C. Delerablee, "Identity-based broadcast ecryption with constant size ciphertexts and private keys," in Proc. ASIACRYPT, LNCS 4833. 2007, pp. 200-215.
-
(2007)
LNCS
, vol.4833
, pp. 200-215
-
-
Delerablee, C.1
-
16
-
-
67650659197
-
Adaptive security in broadcast encryption systems (with short ciphertexts)
-
Proc. EUROCRYPT
-
C. Gentry and B. Waters, "Adaptive security in broadcast encryption systems (with short ciphertexts)," in Proc. EUROCRYPT, LNCS 5479. 2009, pp. 171-188.
-
(2009)
LNCS
, vol.5479
, pp. 171-188
-
-
Gentry, C.1
Waters, B.2
-
17
-
-
77955619367
-
Comments on an efficient secret broadcast in the broadcasting networks
-
Jul.
-
S. Wu, Y. Zhu, and Q. Pu, "Comments on an efficient secret broadcast in the broadcasting networks," IEEE Commun. Lett., vol. 14, no. 7, pp. 685-687, Jul. 2010.
-
(2010)
IEEE Commun. Lett
, vol.14
, Issue.7
, pp. 685-687
-
-
Wu, S.1
Zhu, Y.2
Pu, Q.3
-
18
-
-
77955188662
-
Anonymous multireceiver identitybased encryption
-
Sep.
-
C. I. Fan, L. Y. Huang, and P. H. Ho, "Anonymous multireceiver identitybased encryption," IEEE Trans. Comput., vol. 59, no. 9, pp. 1239-1249, Sep. 2010.
-
(2010)
IEEE Trans. Comput
, vol.59
, Issue.9
, pp. 1239-1249
-
-
Fan, C.I.1
Huang, L.Y.2
Ho, P.H.3
-
19
-
-
84859322276
-
Improved anonymous multi-receiver identity-based encryption
-
H. Y. Chien, "Improved anonymous multi-receiver identity-based encryption," Comput. J., vol. 55, no. 4, pp. 439-446, 2012.
-
(2012)
Comput. J
, vol.55
, Issue.4
, pp. 439-446
-
-
Chien, H.Y.1
-
20
-
-
84880573630
-
-
Dilomathesis, Darmstadt Univ. Technology, Darmstadt, Germany
-
S. Marcus, "Efficient algorithm for pairing-based cryptosystems," Diloma thesis, Darmstadt Univ. Technology, Darmstadt, Germany, 2004.
-
(2004)
Efficient Algorithm for Pairing-based Cryptosystems
-
-
Marcus, S.1
-
21
-
-
33847698965
-
Efficient pairing computation on supersingular Abelian varieties
-
DOI 10.1007/s10623-006-9033-6
-
P. S. L. M. Barreto, S. Galbraith, C. Eigeartaigh, and M. Scott, "Efficient pairing computation on supersingular Abelian varieties," Des. Codes Cryptography, vol. 42, no. 3, pp. 239-271, 2007. (Pubitemid 46384645)
-
(2007)
Designs, Codes, and Cryptography
, vol.42
, Issue.3
, pp. 239-271
-
-
Barreto, P.S.L.M.1
Galbraith, S.D.2
O'Heigeartaigh, C.3
Scott, M.4
|