Back to Results
First PageMeta Content
Cyberwarfare / Security / Applied mathematics / RSA / Cipher / Public key infrastructure / Digital signature / Key / Certificateless cryptography / Cryptography / Public-key cryptography / Key management


Document Date: 2003-10-21 08:21:48


Open Document

File Size: 344,32 KB

Share Result on Facebook

Company

KGC / params SA / G2 / /

/

Event

Reorganization / /

Facility

University of London Egham / /

IndustryTerm

mobile security applications / insurance document / secure systems / elegant applications / polynomial time algorithm / identity-based key exchange protocols / secure algorithms / polynomial-time algorithm / additive / public key cryptographic systems / multiplicative / /

Organization

NUF-NAL / Certification Authority / Nuffield Foundation / University of London Egham / /

Person

Kenneth G. Paterson / Sattam S. Al-Riyami / /

Position

author / security model for CL-PKE / valid driver / /

Product

CL / Franklin / /

ProvinceOrState

Pennsylvania / California / /

Technology

encryption / appropriately secure algorithms / Cryptography / 3 Certificateless Public Key Encryption / Public Key Infrastructure / randomized algorithm / PKI technology / Public Key / polynomial time algorithm / certificateless public key encryption / identity-based public key encryption / PKI / polynomial-time algorithm / seven randomized algorithms / private key / certificate-based encryption / identity-based key exchange protocols / /

SocialTag