Back to Results
First PageMeta Content
Cryptographic protocols / Electronic commerce / X.509 / Transport Layer Security / ID-based cryptography / ID-based encryption / Public key infrastructure / Grid Security Infrastructure / Digital signature / Cryptography / Key management / Public-key cryptography


Identity-Based Cryptography for Grid Security Hoon Wei Lim and Kenneth G. Paterson Information Security Group Royal Holloway, University of London Egham, Surrey TW20 0EX, UK {h.lim, kenny.paterson}@rhul.ac.uk
Add to Reading List

Document Date: 2005-09-30 07:23:50


Open Document

File Size: 196,24 KB

Share Result on Facebook

City

San Francisco / eˆ(Q0 / /

Company

IEEE Computer Society Press / G1 / ACM Press / IDt / CBC / PA SA / /

Country

United Kingdom / /

Currency

pence / /

/

Event

FDA Phase / /

Facility

University of London Egham / OpenSSL library / IKIG-enabled OpenSSL library / /

IndustryTerm

security applications / symmetric encryption algorithm / managed job services / grid systems / certificate-free key agreement protocol / public key infrastructure / Web Services Security In / grid security services / public key management / grid services / agreement protocol / proposed Protocols / dynamic key infrastructure / grid security infrastructure / corporate communications / delegation protocol / grid applications / delegation services / related multiplicative / proposed identity-based key infrastructure / additive / lightweight delegation protocol / grid computing / communication protocols / computing / mature technology / security protocols / scientific computing / web services security / security infrastructure / identity-based authenticated key agreement protocol / customised identity-based key agreement protocol / restricted escrow-free protocol / customised identity-based authenticated key agreement protocol / conventional public key management / secure communications / possible solution / generation algorithms / public key technologies / security services / delegation protocols / certificate-based grid systems / handshake protocol / identity-based key infrastructure / /

MusicGroup

RA / /

Organization

Certificate Authority/Registration Authority / Internet Engineering Task Force / HP Lab / University of London Egham / Trusted Authority / /

Person

Key Generator / S. Meder / V / Wei Lim / Kenneth G. Paterson / S. Tuecke / V / Steven Galbraith / /

Position

editor / local administrator / Resource Broker / Private / /

Product

Franklin / SigA / GSI / /

ProgrammingLanguage

XML schema / XML / /

ProvinceOrState

California / Pennsylvania / /

Technology

XML / delegation protocols / Application Program Interface / lightweight delegation protocol / API / PKI / actual TLS protocol / Extensible Markup Language / security protocols / secret key / one-pass delegation protocol / customised identity-based key agreement protocol / public key technologies / public key encryption / encryption / Cryptography / proposed Protocols / TLS protocol / customised identity-based authenticated key agreement protocol / XTRACT algorithm / HIBE encryption / delegation protocol / TLS handshake protocol / GSI delegation protocol / symmetric encryption algorithm / public key infrastructure / identity-based authenticated key agreement protocol / RSA encryption / key agreement protocol / hierarchical identity-based encryption / certificate-free key agreement protocol / Identity-based encryption / RSA key exchange algorithm / private key / SSL / restricted escrow-free protocol / public key / improved protocols / ETUP algorithm / key generation algorithms / communication protocols / /

URL

http /

SocialTag