Ad Hoc Networks 10 :7, Ad Hoc Networks 10 :6, Computer Networks 56 , The Journal of Supercomputing 61 :2, Journal of Cryptology 25 :3, Information Fusion 13 :3, ETRI Journal 34 :3, Journal of Network and Computer Applications 35 :3, Cybernetics and Systems Analysis 48 :3, Journal of Korean Society for Internet Information 13 :2, Journal of the Korea Society of Computer and Information 17 :4, ETRI Journal 34 :2, Journal of Cryptology 25 :2, Journal of Information Processing Systems 8 :1, Journal of Symbolic Computation 47 :3, Journal of Systems and Software 85 :3, Handbook of Computer Networks, Jens Groth and Amit Sahai.
Security and Communication Networks 5 :1, IET Communications 6 :8, Wireless Communications and Mobile Computing 12 :1, Mathematical and Computer Modelling 55 , IET Information Security 6 :1, Journal of Mathematical Cryptology 5 Journal of Computer and System Sciences 78 :1, Cyberspace Safety and Security, Foundations and Practice of Security, Another Look at Tightness.
Information Security Applications, Computing on Authenticated Data. Revocable Identity-Based Encryption from Lattices. Global Trends in Computing and Communication Systems, Group Signatures with Almost-for-Free Revocation.
- Romeo and Juliet (Websters Thesaurus Edition).
- The Trident Series Volume 1 The Trident and the Book;
- Adland: A Global History of Advertising.
- Incentives in Health Systems;
Computer-Aided Cryptographic Proofs. Interactive Theorem Proving, Network and System Security, Homomorphic Encryption for Multiplications and Pairing Evaluation. Frontiers of Computer Science in China 5 :4, Journal of Network and Systems Management 19 :4, Mobile Networks and Applications 16 :6, Peer-to-Peer Networking and Applications 4 :4, Wuhan University Journal of Natural Sciences 16 :5, Journal of Cryptology 24 :4, Applied Mechanics and Materials , Computer 44 :9, Journal of Systems Science and Complexity 24 :4, Journal of Cryptology 24 :3, Wireless Networks 17 :4, Journal of Number Theory :5, International Journal of Communication Systems 24 :4, Journal of Software 22 :1, Designs, Codes and Cryptography 58 :3, Computer Communications 34 :3, Journal of Systems Science and Complexity 24 :1, The Journal of Supercomputing 55 :2, Computer Science Review 5 :1, Journal of Systems Architecture 57 :1, Journal of Information Processing 19 , Security and Privacy Assurance in Advancing Technologies, Information Security Theory and Practice.
Applied Cryptography for Cyber Security and Defense, Security and Communication Networks 4 :1, Journal of Cryptology 24 :1, Globalization of Mobile and Wireless Communications, Attribute-Based Signatures. Functional Encryption: Definitions and Challenges. Adaptively Secure Non-interactive Threshold Cryptosystems. Automata, Languages and Programming, Trust Management V, Public Key Infrastructures, Services and Applications, Searchable Encryption for Outsourced Data Analytics.
Fully Distributed Broadcast Encryption.
Computer Networks and Information Technologies, Energy Procedia 13 , Journal of Systems Science and Complexity 23 :6, International Journal of Foundations of Computer Science 21 , Advances in Mathematics of Communications 4 :4, Wireless Networks 16 :8, Journal of Systems and Software 83 , Physics Letters A , Journal of Parallel and Distributed Computing 70 :8, Applicable Algebra in Engineering, Communication and Computing 21 :4, Journal of Communications and Networks 12 :3, Computer Networks 54 :9, Information Sciences :7, Designs, Codes and Cryptography 54 :3, Journal of Mathematical Cryptology 4 :1, Journal of Systems and Software 83 :1, Pairing-Based Cryptography - Pairing , An E-Hospital Security Architecture.
Ad Hoc Networks, Robust Encryption. Elliptic Curve Cryptography. Handbook of Information and Communication Security, Secure Delegation of Elliptic-Curve Pairing. Smart Card Research and Advanced Application, Communications and Multimedia Security, Arithmetic of Finite Fields, Signcryption Schemes Based on Bilinear Maps.
Practical Signcryption, Identity-Based Signcryption.
Random Oracles with out Programmability. Signcryption with Non-interactive Non-repudiation without Random Oracles. Transactions on Computational Science X, Information Security Theory and Practices.
- ID-based encryption.
- Navigation menu.
- ID-based cryptography - Wikipedia.
- Modelling and Simulation of a Biometric Identity-Based Cryptography.
- InfoSec Career Hacking.
Secure Obfuscation for Encrypted Signatures. Searching Keywords with Wildcards on Encrypted Data. Journal of Software 20 , Information Fusion 10 :4, International Journal of Information Security and Privacy 3 :3, Journal of Systems and Software 82 :4, International Journal of Information Security 8 :2, Journal of Shanghai University English Edition 13 :2, Journal of Shanghai Jiaotong University Science 14 :1, Journal of Mathematical Cryptology 3 Intelligent Information Management 01 , Asymmetric Group Key Agreement.
Emerging Challenges for Security, Privacy and Trust, Advances in Biometrics, Novel Efficient Certificateless Aggregate Signatures. Advances in Information Security and Assurance, Certified Encryption Revisited. Privacy Enhancing Technologies, Strongly Secure Certificateless Key Agreement. Faster Pairings on Special Weierstrass Curves. Advances in Computation and Intelligence, Breaking and Building of Group Inside Signature.
Identity Based Encryption using Pairings and Crypt::PBC
Security and Privacy in Communication Networks, Dual-Policy Attribute Based Encryption. Security in Web-Facing Applications.
Architecting Secure Software Systems, Journal of Communications and Networks 10 :4, Information Processing Letters :5, International Journal of Information Security 7 :6, Journal of Applied Sciences 8 , Journal of Software 19 :9, Computer Communications 31 , International Journal of Computer Mathematics 85 :9, Designs, Codes and Cryptography 48 :3, Journal of the Korean Mathematical Society 45 :4, Journal of Cryptology 21 :3, Third International Conference on Systems icons , Finite Fields and Their Applications 14 :2, Journal of Cryptology 21 :2, Security and Communication Networks 1 :2, Information Sciences :3, IET Information Security 2 :3, More Discriminants with the Brezing-Weng Method.
The Future of Identity in the Information Society, RFID Security, Privacy of Outsourced Data.
Supercharging Firewall Events for Self-Serve
Digital Privacy, Computer Networks 51 , Japan Journal of Industrial and Applied Mathematics 24 :3, Overview of Cryptographic Primitives for Secure Communication. Wireless Security and Cryptography.
- TM8111 - Identity-Based Cryptography?
- Feardom: How Politicians Exploit Your Emotions and What You Can Do to Stop Them?
- Overseas Chinese of South East Asia.
- A Survey of Identity-Based Cryptography (2004).
- The Science of Influence: How to Get Anyone to Say Yes in 8 Minutes or Less!.
- Political Violence in Egypt 1910-1925: Secret Societies, Plots and Assassinations.
- How it Works - Voltage SecureMail On-Premises | Micro Focus.
Designs, Codes and Cryptography 42 :3, Information Sciences :6, Discrete Applied Mathematics :4, Cynthia Dwork and Moni Naor. Wuhan University Journal of Natural Sciences 12 :1, Non-interactive Proofs for Integer Multiplication. Network-Based Information Systems, Computational Intelligence and Security, Security Mediated Certificateless Signatures.
Identity-Based Proxy Re-encryption. Security and Privacy in Future Mobile Networks.
An Introduction to Identity-based Cryptography
Wuhan University Journal of Natural Sciences 11 :5, Designs, Codes and Cryptography 39 :2, Information Processing Letters 97 :6, Designs, Codes and Cryptography 38 :2, Mobile Security and Privacy. Secure Cryptographic Workflow in the Standard Model.
Identity-Based Cryptography Techniques and Applications A Review Abstract: This paper is reviewed the state of research on the important topic in the field of information interchange that is identity based cryptography which more or less extention of the public key cryptography field. The paper starts with analyzing the fundamental concepts of identity based cryptography techniques, which includes encryption and the techniques of digital signature for authentication, which is called as identity based signature.
Afterwards the paper continue its analyses on various techniques and applications of identity-based cryptography depends on the methods of bilinear pairing that is a computational ancient widely used to build up various identity based cryptography system in the current literature.
Afterwards this paper reviewed the identity based encryption applications in the field of various networks as ad-hoc networks, mobile networks and other wireless networks in the current era. At the end of this paper, we discuss how realistic and under what parameters identity-based cryptography may be used in current and future environment with its benefits and limitations. Full Text. Abstract: Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties.
Even though e-Government provides a number of advantages, it also introduces a range of new security risks.