Survey of security on identity-based cryptography

被引:0
|
作者
College of Computer Science and Technology, Jilin University, Changchun 130012, China [1 ]
不详 [2 ]
机构
来源
Jisuanji Yanjiu yu Fazhan | 2009年 / 9卷 / 1537-1548期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] A Survey of Identity-based Signcryption
    Li, Fagen
    Khan, Muhammad Khurram
    IETE TECHNICAL REVIEW, 2011, 28 (03) : 265 - 272
  • [32] Using Identity-Based Secret Public Keys Cryptography for Heuristic Security Analyses in Grid Computing
    Kamali, Seyed Hossein
    Hedayati, Maysam
    Shakerian, Reza
    Ghasempour, Saber
    JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE-JMCS, 2011, 3 (04): : 357 - 375
  • [33] QUANTUM-SAFE IDENTITY-BASED BROADCAST ENCRYPTION WITH PROVABLE SECURITY FROM MULTIVARIATE CRYPTOGRAPHY
    Sarkar, Ramprasad
    Mandal, Mriganka
    Mukhopadhyay, Sourav
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2024, 18 (03) : 814 - 827
  • [34] Electronic payment scheme using identity-based cryptography
    Nguyen, Son Thanh
    Rong, Chunming
    PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2007, 4582 : 330 - +
  • [35] EIBC: Enhanced Identity-Based Cryptography, a Conceptual Design
    Nicanfar, Hasen
    Leung, Victor C. M.
    2012 IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON), 2012, : 179 - 185
  • [36] Toward hierarchical identity-based cryptography for tactical networks
    Matt, BJ
    MILCOM 2004 - 2004 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1- 3, 2004, : 727 - 735
  • [37] Securing Mobile Phone Calls with Identity-Based Cryptography
    Smith, Matthew
    Schridde, Christian
    Agel, Bjoern
    Freisleben, Bernd
    ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 210 - 222
  • [38] Identity-based Cryptography for Securing Mobile Phone Calls
    Smith, Matthew
    Schridde, Christian
    Agel, Bjoern
    Freisleben, Bernd
    2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS: WAINA, VOLS 1 AND 2, 2009, : 365 - 370
  • [39] A Secure Email Encryption Proxy Based on Identity-based Cryptography
    Chen, Tieming
    Ma, Shilong
    2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 284 - 286
  • [40] Identity-Based Cryptography on Hidden-Order Groups
    Lin, Chanlgu
    2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 2067 - 2071