First Page | Meta Content | |
---|---|---|
![]() | Document Date: 2003-10-21 08:21:48Open Document File Size: 344,32 KBShare Result on FacebookCompanyKGC / params SA / G2 / / /EventReorganization / /FacilityUniversity of London Egham / /IndustryTermmobile security applications / insurance document / secure systems / elegant applications / polynomial time algorithm / identity-based key exchange protocols / secure algorithms / polynomial-time algorithm / additive / public key cryptographic systems / multiplicative / /OrganizationNUF-NAL / Certification Authority / Nuffield Foundation / University of London Egham / /PersonKenneth G. Paterson / Sattam S. Al-Riyami / /Positionauthor / security model for CL-PKE / valid driver / /ProductCL / Franklin / /ProvinceOrStatePennsylvania / California / /Technologyencryption / appropriately secure algorithms / Cryptography / 3 Certificateless Public Key Encryption / Public Key Infrastructure / randomized algorithm / PKI technology / Public Key / polynomial time algorithm / certificateless public key encryption / identity-based public key encryption / PKI / polynomial-time algorithm / seven randomized algorithms / private key / certificate-based encryption / identity-based key exchange protocols / /SocialTag |