Identity-based cryptography

Results: 85



#Item
71Fraud / Social engineering / Payment systems / Authentication / Notary / Credit card fraud / Anomaly detection / Risk-based authentication / Identity theft / Security / Cryptography / Access control

W H I T E PA P E R VeriSign® Identity Protection Fraud Detection Service An Overview

Add to Reading List

Source URL: www.complianceandprivacy.com

Language: English - Date: 2007-03-03 10:21:37
72Public key certificate / Public-key cryptography / Pension / Identity document / Cryptography / Electronic commerce / Key management

OFFLINE FORMATS: For Downloading For claiming financial support for Special Emergency Needs based on occurrence (Can be claimed more than once a Financial year):Format No.

Add to Reading List

Source URL: www.bheltry.co.in

Language: English - Date: 2013-12-03 06:11:00
73Cyberwarfare / ID-based encryption / Ciphertext / RSA / Access control / Hierarchy / Cipher / Key management / Cryptography / Public-key cryptography / Security

Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information Urs Hengartner and Peter Steenkiste October 2004 CMU-CS[removed]

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-11-01 14:47:14
74Cyberwarfare / ID-based encryption / Ciphertext / ElGamal encryption / Hybrid cryptosystem / RSA / Cipher / Access control / Cryptography / Public-key cryptography / Security

Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information Urs Hengartner† and Peter Steenkiste†‡ † Computer Science Department ‡

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2005-06-27 14:38:48
75RSA / Hash function / One-way function / Trapdoor function / Cryptography / Digital signature / Cryptographic hash function

Hierarchical Identity-Based Chameleon Hash and Its Applications Feng Bao1 , Robert H. Deng2 , Xuhua Ding2 , Junzuo Lai2⋆ , and Yunlei Zhao3 1 Institute for Infocomm Research, Singapore

Add to Reading List

Source URL: www.mysmu.edu

Language: English - Date: 2011-06-01 03:00:45
76Digital signature / Methicillin-resistant Staphylococcus aureus / Certificate authority / ID-based encryption / Public key certificate / ID-based cryptography / S/MIME / Cryptography / Public-key cryptography / RSA

Identity-Based Mediated RSA? Dan Boneh1 , Xuhua Ding2 , and Gene Tsudik2 1 2

Add to Reading List

Source URL: www.mysmu.edu

Language: English - Date: 2003-11-16 21:31:42
77Optimal asymmetric encryption padding / Adaptive chosen-ciphertext attack / Methicillin-resistant Staphylococcus aureus / Malleability / Digital signature / Semantic security / Chosen-ciphertext attack / ID-based encryption / PKCS / Cryptography / Public-key cryptography / RSA

Simple Identity-Based Cryptography with Mediated RSA ? Xuhua Ding and Gene Tsudik Department of Information and Computer Science, University of California, Irvine. Email: {xhding,gts}@ics.uci.edu

Add to Reading List

Source URL: www.mysmu.edu

Language: English - Date: 2005-07-01 12:17:37
78Fraud / Social engineering / Payment systems / Authentication / Notary / Credit card fraud / Anomaly detection / Risk-based authentication / Identity theft / Security / Cryptography / Access control

W H I T E PA P E R VeriSign® Identity Protection Fraud Detection Service An Overview

Add to Reading List

Source URL: complianceandprivacy.com

Language: English - Date: 2007-03-03 10:21:37
79Key encapsulation / Electronic commerce / ID-based encryption / Optimal asymmetric encryption padding / Key size / RSA / Symmetric-key algorithm / XTR / ID-based cryptography / Cryptography / Key management / Public-key cryptography

SK-KEM : AN IDENTITY-BASED KEM M. BARBOSA, L. CHEN, Z. CHENG, M. CHIMLEY, A. DENT, P. FARSHIM, K. HARRISON, J. MALONE-LEE, N.P. SMART, AND F. VERCAUTEREN

Add to Reading List

Source URL: grouper.ieee.org

Language: English - Date: 2008-04-27 09:53:36
80Cyberwarfare / Boneh/Franklin scheme / XTR / Advantage / Polynomial / Security / Applied mathematics / Cryptography / Ciphertext indistinguishability / ID-based encryption

Security Proof of Sakai-Kasahara’s Identity-Based Encryption Scheme Liqun Chen1 and Zhaohui Cheng2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-08-31 15:06:27
UPDATE