-
1
-
-
77956877124
-
The internet of things: A survey
-
L. Atzori, A. Iera, and G. Morabito The internet of things: a survey Comput. Netw. 54 15 2010 2787 2805
-
(2010)
Comput. Netw.
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
2
-
-
77953751129
-
-
European Commission-Information Society and Media DG
-
V. Ovidiu, M. Harrison, H. Vogt, K. Kalaboukas, M. Tomasella, K. Wouters, S. Gusmeroli, and S. Haller Internet of things strategic research roadmap 2009 European Commission-Information Society and Media DG
-
(2009)
Internet of Things Strategic Research Roadmap
-
-
Ovidiu, V.1
Harrison, M.2
Vogt, H.3
Kalaboukas, K.4
Tomasella, M.5
Wouters, K.6
Gusmeroli, S.7
Haller, S.8
-
3
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Springer
-
A. Shamir Identity-based cryptosystems and signature schemes Advances in Cryptology 1985 Springer 47 53
-
(1985)
Advances in Cryptology
, pp. 47-53
-
-
Shamir, A.1
-
5
-
-
24944566040
-
Efficient identity-based encryption without random oracles
-
Springer
-
B. Waters Efficient identity-based encryption without random oracles Advances in Cryptology - EUROCRYPT 2005 2005 Springer 114 127
-
(2005)
Advances in Cryptology - EUROCRYPT 2005
, pp. 114-127
-
-
Waters, B.1
-
6
-
-
33746062799
-
Practical identity-based encryption without random oracles
-
Springer
-
C. Gentry Practical identity-based encryption without random oracles Advances in Cryptology - EUROCRYPT 2006 2006 Springer 445 464
-
(2006)
Advances in Cryptology - EUROCRYPT 2006
, pp. 445-464
-
-
Gentry, C.1
-
7
-
-
85025629535
-
Identity-based parallel key-insulated encryption without random oracles: Security notions and construction
-
Springer
-
J. Weng, S. Liu, K. Chen, and C. Ma Identity-based parallel key-insulated encryption without random oracles: security notions and construction Progress in Cryptology - INDOCRYPT 2006 2006 Springer 409 423
-
(2006)
Progress in Cryptology - INDOCRYPT 2006
, pp. 409-423
-
-
Weng, J.1
Liu, S.2
Chen, K.3
Ma, C.4
-
8
-
-
43149100586
-
Identity-based threshold key-insulated encryption without random oracles
-
Springer
-
J. Weng, S. Liu, K. Chen, D. Zheng, and W. Qiu Identity-based threshold key-insulated encryption without random oracles Topics in Cryptology - CT-RSA 2008 2008 Springer 203 220
-
(2008)
Topics in Cryptology - CT-RSA 2008
, pp. 203-220
-
-
Weng, J.1
Liu, S.2
Chen, K.3
Zheng, D.4
Qiu, W.5
-
9
-
-
70350345210
-
Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions
-
Springer
-
B. Waters Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions Advances in Cryptology - CRYPTO 2009 2009 Springer 619 636
-
(2009)
Advances in Cryptology - CRYPTO 2009
, pp. 619-636
-
-
Waters, B.1
-
10
-
-
84874314815
-
Accountable authority identity-based encryption with public traceability
-
Springer
-
J. Lai, R.H. Deng, Y. Zhao, and J. Weng Accountable authority identity-based encryption with public traceability Topics in Cryptology - CT-RSA 2013 2013 Springer 326 342
-
(2013)
Topics in Cryptology - CT-RSA 2013
, pp. 326-342
-
-
Lai, J.1
Deng, R.H.2
Zhao, Y.3
Weng, J.4
-
11
-
-
84901673593
-
Identity-based encryption secure against selective opening chosen-ciphertext attack
-
Springer
-
J. Lai, R.H. Deng, S. Liu, J. Weng, and Y. Zhao Identity-based encryption secure against selective opening chosen-ciphertext attack Advances in Cryptology - EUROCRYPT 2014 2014 Springer 77 92
-
(2014)
Advances in Cryptology - EUROCRYPT 2014
, pp. 77-92
-
-
Lai, J.1
Deng, R.H.2
Liu, S.3
Weng, J.4
Zhao, Y.5
-
18
-
-
4243180376
-
The random oracle methodology, revisited
-
R. Canetti, O. Goldreich, and S. Halevi The random oracle methodology, revisited J. ACM 51 4 2004 557 594
-
(2004)
J. ACM
, vol.51
, Issue.4
, pp. 557-594
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
19
-
-
4243180376
-
The random oracle methodology, revisited
-
R. Canetti, O. Goldreich, and S. Halevi The random oracle methodology, revisited J. ACM 51 4 2004 557 594
-
(2004)
J. ACM
, vol.51
, Issue.4
, pp. 557-594
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
20
-
-
78650287972
-
New fuzzy identity-based encryption in the standard model
-
Y. Ren, D. Gu, S. Wang, and X. Zhang New fuzzy identity-based encryption in the standard model Informatica 21 3 2010 393 407
-
(2010)
Informatica
, vol.21
, Issue.3
, pp. 393-407
-
-
Ren, Y.1
Gu, D.2
Wang, S.3
Zhang, X.4
-
21
-
-
84863645850
-
Cryptanalysis of a fuzzy identity based encryption scheme in the standard model
-
X.A. Wang, X. Yang, M. Zhang, and Y. Yu Cryptanalysis of a fuzzy identity based encryption scheme in the standard model Informatica 23 2 2012 299 314
-
(2012)
Informatica
, vol.23
, Issue.2
, pp. 299-314
-
-
Wang, X.A.1
Yang, X.2
Zhang, M.3
Yu, Y.4
-
22
-
-
84897604272
-
Security analysis of a fuzzy identity-based encryption scheme
-
M. Tian, L. Huang, and W. Yang Security analysis of a fuzzy identity-based encryption scheme Journal of Circuits, Systems, and Computers 23 03 2014
-
(2014)
Journal of Circuits, Systems, and Computers
, vol.23
, Issue.3
-
-
Tian, M.1
Huang, L.2
Yang, W.3
-
23
-
-
38049078557
-
Multi-authority attribute based encryption
-
Springer
-
M. Chase Multi-authority attribute based encryption Theory of Cryptography 2007 Springer 515 534
-
(2007)
Theory of Cryptography
, pp. 515-534
-
-
Chase, M.1
-
25
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
Springer
-
D. Boneh, C. Gentry, and B. Waters Collusion resistant broadcast encryption with short ciphertexts and private keys Advances in Cryptology - CRYPTO 2005 2005 Springer 258 275
-
(2005)
Advances in Cryptology - CRYPTO 2005
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
27
-
-
0033342534
-
Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security
-
IEEE
-
A. Sahai Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security 40th Annual Symposium on Foundations of Computer Science, 1999 1999 IEEE 543 553
-
(1999)
40th Annual Symposium on Foundations of Computer Science, 1999
, pp. 543-553
-
-
Sahai, A.1
-
28
-
-
24144453101
-
Improved efficiency for CCA-secure cryptosystems built using identity-based encryption
-
Springer
-
D. Boneh, and J. Katz Improved efficiency for CCA-secure cryptosystems built using identity-based encryption Topics in Cryptology - CT-RSA 2005 2005 Springer 87 103
-
(2005)
Topics in Cryptology - CT-RSA 2005
, pp. 87-103
-
-
Boneh, D.1
Katz, J.2
|