Back to Results
First PageMeta Content
Key management / Secure communication / Public key infrastructure / Grid Security Infrastructure / Key-agreement protocol / X.509 / Transport Layer Security / Key exchange / Diffie–Hellman key exchange / Cryptography / Cryptographic protocols / Public-key cryptography


On the Application of Identity-Based Cryptography in Grid Security Hoon Wei Lim Thesis submitted to the University of London for the degree of Doctor of Philosophy
Add to Reading List

Document Date: 2006-05-02 10:04:49


Open Document

File Size: 882,43 KB

Share Result on Facebook

City

Certificated / hierarchical identity / /

Company

DKIG / /

Facility

University of London / /

IndustryTerm

lightweight key management / grid security infrastructure / certain grid applications / Web Services Web Services Description Language Web Services / delegation protocol / grid applications / Internet protocol architecture / public key infrastructure / security services / secret public key protocol / secure password-based authenticated key establishment protocols / credential storage systems / handshake protocol / Web eXtensible Markup Language / password-based protocols / Web Services Security / identity-based key infrastructure / dynamic key infrastructure / Web Services / /

Organization

Organisation of Thesis / Department of Mathematics / Philosophy Information Security Group Department of Mathematics Royal Holloway / University of London / /

Person

Qiang Tang / Matt Robshaw / Allan Tomlinson / Jacob Schuldt / Po-Wah Yau / Kenny Paterson / Fred Piper / Johan Tordsson / Maura Paterson / Matthew J.B. Robshaw / Scarlet Schwiderski-Grosche / Chris Mitchell / Wei Lim January / David Mireles / Peter Gardfj¨all / Jason Crampton / Ivona Brandic / Peter Wild / Geraint Price / Soo Khoon Chai / Steven Galbraith / Kenneth G. Paterson / /

ProgrammingLanguage

XML / /

Technology

secure password-based authenticated key establishment protocols / Security Technologies / password-based protocols / secret public key protocol / Cryptography / XML / public key infrastructure / Application Program Interface / 2.2 Existing Security Technologies / 6.3 Secret Public Key Protocols / Two-Party ID-SPK Protocol / Public Key / Status Protocol / IP / API / PKI / Hierarchical Identity-Based Encryption / delegation protocol / Identity-Based Encryption / HTTP / eXtensible Markup Language / Three-Party ID-SPK Protocol / Private Key / HyperText Transport Protocol / Authority Transmission Control Protocol / ID-SPK Protocols / TLS handshake protocol / one-pass delegation protocol / /

SocialTag