-
1
-
-
33646820668
-
Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
-
Barreto, P. S. L. M., Libert, B. I., McCullagh, N., Quisquater, J. J.: Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. In: Advances in Cryptology ASIACRYPT 2005, vol. 3788, pp. 515-532 (2005).
-
(2005)
Advances in Cryptology ASIACRYPT 2005
, vol.3788
, pp. 515-532
-
-
Barreto, P.S.L.M.1
Libert, B.I.2
McCullagh, N.3
Quisquater, J.J.4
-
2
-
-
0037623983
-
Identity-based encryption from the Weil pairing
-
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. SIAM J. Comput. 32(3), 586-615 (2003).
-
(2003)
SIAM J. Comput.
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
84870688789
-
Identity-based proxy signature for cloud service in SaaS
-
Los Alamitos: IEEE Comp. Soc
-
Cao, X., Xu, L., Zhang, Y., Wu, W.: Identity-based proxy signature for cloud service in SaaS. In: Intelligent Networking and Collaborative Systems (INCoS), 2012 4th International Conference, pp. 594-599. IEEE Comp. Soc., Los Alamitos (2012).
-
(2012)
Intelligent Networking and Collaborative Systems (INCoS), 2012 4th International Conference
, pp. 594-599
-
-
Cao, X.1
Xu, L.2
Zhang, Y.3
Wu, W.4
-
4
-
-
35248844436
-
An identity-based signature from gap Diffie-Hellman groups
-
LNCS, Berlin: Springer
-
Choon, C. J., Hee, C. J.: An identity-based signature from gap Diffie-Hellman groups. In: Public Key Cryptography-PKC 2003. LNCS, vol. 2139, pp. 18-30. Springer, Berlin (2002).
-
(2002)
Public Key Cryptography-PKC 2003
, vol.2139
, pp. 18-30
-
-
Choon, C.J.1
Hee, C.J.2
-
5
-
-
84888847648
-
Ontology as a service (oaas): extracting and replacing sub-ontologies on the cloud
-
doi: 10. 1007/s10586-012-0231-x
-
Flahive, A., Taniar, D., Rahayu, W: Ontology as a service (oaas): extracting and replacing sub-ontologies on the cloud. Clust. Comput., 1-14 (2012). doi: 10. 1007/s10586-012-0231-x.
-
(2012)
Clust. Comput.
, pp. 1-14
-
-
Flahive, A.1
Taniar, D.2
Rahayu, W.3
-
6
-
-
35248867510
-
Efficient identity based signature schemes based on pairings
-
Lecture Notes in Computer Science, N. Kaisa and M. H. Howard (Eds.), Berlin: Springer
-
Florian, H.: Efficient identity based signature schemes based on pairings. In: Kaisa, N., Howard, M. H. (eds.) Selected Areas in Cryptography. Lecture Notes in Computer Science, vol. 2595, pp. 310-324. Springer, Berlin (2002).
-
(2002)
Selected Areas in Cryptography
, vol.2595
, pp. 310-324
-
-
Florian, H.1
-
7
-
-
54249111511
-
An efficient ID-based proxy signature scheme from pairings
-
D. Pei, M. Yung, D. Lin, and C. Wu (Eds.), Berlin: Springer
-
Gu, C., Zhu, Y.: An efficient ID-based proxy signature scheme from pairings. In: Pei, D., Yung, M., Lin, D., Wu, C. (eds.) Inscrypt. Lecture Notes in Computer Science, vol. 4990, pp. 40-50. Springer, Berlin (2007).
-
(2007)
Inscrypt. Lecture Notes in Computer Science
, vol.4990
, pp. 40-50
-
-
Gu, C.1
Zhu, Y.2
-
8
-
-
0345092813
-
Legal recognition of digital-signatures
-
Hollaar, L., Asay, A.: Legal recognition of digital-signatures. J. IEEE MICRO 16(3), 44-45 (1996).
-
(1996)
J. IEEE MICRO
, vol.16
, Issue.3
, pp. 44-45
-
-
Hollaar, L.1
Asay, A.2
-
9
-
-
84888845937
-
Snuage: an efficient platform-as-a-service security framework for the cloud
-
doi: 10. 1007/s10586-012-0223-x
-
Itani, W., Kayssi, A., Chehab, A.: Snuage: an efficient platform-as-a-service security framework for the cloud. Clust. Comput., 1-18 (2012). doi: 10. 1007/s10586-012-0223-x.
-
(2012)
Clust. Comput.
, pp. 1-18
-
-
Itani, W.1
Kayssi, A.2
Chehab, A.3
-
10
-
-
0010567510
-
Proxy signatures, revisited
-
Y. Han, T. Okamoto, and S. Qing (Eds.), Berlin: Springer
-
Kim, S., Park, S., Won, D.: Proxy signatures, revisited. In: Han, Y., Okamoto, T., Qing, S. (eds.) ICICS. Lecture Notes in Computer Science, vol. 1334, pp. 223-232. Springer, Berlin (1997).
-
(1997)
ICICS. Lecture Notes in Computer Science
, vol.1334
, pp. 223-232
-
-
Kim, S.1
Park, S.2
Won, D.3
-
11
-
-
1642614187
-
Strong proxy signature and its applications
-
Lee, B., Kim, H., Kim, K.: Strong proxy signature and its applications. In: Proc. of the 2001 Symposium on Cryptography and Information Security, pp. 603-608 (2001).
-
(2001)
Proc. Of the 2001 Symposium on Cryptography and Information Security
, pp. 603-608
-
-
Lee, B.1
Kim, H.2
Kim, K.3
-
14
-
-
0029717329
-
Proxy signatures for delegating signing operation
-
CCS
-
Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. In: Proc. of the 3rd ACM Conference on Computer and Communications Security. CCS, vol. 96, pp. 48-57 (1996).
-
(1996)
Proc. Of the 3rd ACM Conference on Computer and Communications Security
, vol.96
, pp. 48-57
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
16
-
-
77950358775
-
Cloud computing and SaaS as new computing platforms
-
Michael, A. C.: Cloud computing and SaaS as new computing platforms. Commun. ACM 53(4), 27-29 (2010).
-
(2010)
Commun. ACM
, vol.53
, Issue.4
, pp. 27-29
-
-
Michael, A.C.1
-
17
-
-
84881024032
-
Research trends in cloud, cluster and grid computing
-
doi: 10. 1007/s10586-012-0213-z
-
Park, J., Yang, L. T., Chen, J.: Research trends in cloud, cluster and grid computing. Clust. Comput., 1-3 (2012). doi: 10. 1007/s10586-012-0213-z.
-
(2012)
Clust. Comput.
, pp. 1-3
-
-
Park, J.1
Yang, L.T.2
Chen, J.3
-
19
-
-
84880883264
-
Improved online/offline signature schemes
-
Santa Barbara, California, USA19-23 August 2001Lecture Notes in Computer Science, Berlin: Springer
-
Shamir, A., Tauman, Y.: Improved online/offline signature schemes. In: Advances in Cryptology-CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, 19-23 August 2001. Lecture Notes in Computer Science, vol. 2139, pp. 355-367. Springer, Berlin (2001).
-
(2001)
Advances in Cryptology-CRYPTO 2001, 21st Annual International Cryptology Conference
, vol.2139
, pp. 355-367
-
-
Shamir, A.1
Tauman, Y.2
-
20
-
-
38049022497
-
Identity-based proxy signature from pairings
-
LNCS, Berlin: Springer
-
Wu, W., Mu, Y., Susilo, W., Seberry, J., Huang, X.: Identity-based proxy signature from pairings. In: Autonomic and Trusted Computing. LNCS, vol. 4610, pp. 22-31. Springer, Berlin (2007).
-
(2007)
Autonomic and Trusted Computing
, vol.4610
, pp. 22-31
-
-
Wu, W.1
Mu, Y.2
Susilo, W.3
Seberry, J.4
Huang, X.5
-
21
-
-
33646690058
-
ID-based proxy signature using bilinear pairings
-
LNCS, Berlin: Springer
-
Xu, J., Zhang, Z., Feng, D.: ID-based proxy signature using bilinear pairings. In: Parallel and Distributed Processing and Applications-ISPA 2005 Workshops. LNCS, vol. 3759, pp. 359-367. Springer, Berlin (2005).
-
(2005)
Parallel and Distributed Processing and Applications-ISPA 2005 Workshops
, vol.3759
, pp. 359-367
-
-
Xu, J.1
Zhang, Z.2
Feng, D.3
-
22
-
-
82255161241
-
The research and design of cloud computing security framework
-
LNEE, Berlin: Springer
-
Yan, X., Zhang, X., Chen, T., Zhao, H., Li, X.: The research and design of cloud computing security framework. In: Advances in Computer, Communication, Control and Automation. LNEE, vol. 121, pp. 757-763. Springer, Berlin (2012).
-
(2012)
Advances in Computer, Communication, Control and Automation
, vol.121
, pp. 757-763
-
-
Yan, X.1
Zhang, X.2
Chen, T.3
Zhao, H.4
Li, X.5
|