| Document Date: 2004-11-17 13:32:31 Open Document File Size: 551,09 KBShare Result on Facebook
City the Identity / Palo Alto / / Company the New York Times / AES / G1 / USENIX Press / Shamus Software Ltd. / G2 / Stanford Applied Cryptography Group / MySQL / / Currency pence / / / Facility Stanford Identity-Based Encryption library / Cryptlib library / Rational Arithmetic C/C++ Library / / IndustryTerm hash chain / legitimate search access / verifiable audit log systems / server software / search capabilities / Web Proceedings / search/decrypt / search access / verifier systems / search keyword capability / indexing algorithm / search/decryption pairings / search capability / keyword search capability / legitimate search capabilities / search capability component corresponding / keyword search / search keywords / keyword search capabilities / database server / jth server / proxy server / particular audit log server / audit log server / on-line fashion / keyword search information cwn / / OperatingSystem Linux / / Organization Princeton University / Palo Alto Research Center / Stanford / / Person Alice Alice Smith Smith / Proc / Alice Smith / / / Position investigator / wb / author / logger / / Product Franklin / / ProgrammingLanguage C++ / / ProvinceOrState New Jersey / California / / PublishedMedium the New York Times / Lecture Notes in Computer Science / / Technology indexing algorithm / 2 The Identity-Based Encryption / particular IdentityBased Encryption / Linux / identity-based encryption / private key / encryption / above Identity-Based Encryption / cryptography / IBE encryptions / symmetric encryption / searchable public-key encryption / public key / proxy server / public-key encryption / system parameters P. Encryption / Searchable public key encryption / http / IBE encryption / block encryption / / URL http /
SocialTag |