Introduction to identity-based cryptography

被引:4
|
作者
Joux, Antoine [1 ]
机构
[1] DGA and University, Versailles St-Quentin-en-Yvelines, France
关键词
Active field - Cryptographic community - Identity based cryptography - Identity-based;
D O I
10.3233/978-1-58603-947-9-1
中图分类号
学科分类号
摘要
引用
收藏
页码:1 / 12
相关论文
共 50 条
  • [31] Securing Topology Control in SDWSNs Using Identity-Based Cryptography
    Wang, Rui
    Liu, Donglan
    Liu, Xin
    Chen, Jianfei
    Ma, Lei
    Wang, Yong
    Zhang, Hao
    Yu, Hao
    Su, Bing
    Zhang, Fangzhe
    Sun, Lili
    JOURNAL OF SENSORS, 2023, 2023
  • [32] Design, implementation, and performance evaluation of identity-based cryptography in ONOS
    Lam, JunHuy
    Lee, Sang-Gon
    Lee, Hoon-Jae
    Oktian, Yustus Eko
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2018, 28 (01)
  • [33] What Can Identity-Based Cryptography Offer to Web Services?
    Crampton, Jason
    Lim, Hoon Wei
    Paterson, Kenneth G.
    SWS'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON SECURE WEB SERVICES, 2007, : 26 - 36
  • [34] Achieving Identity-Based Cryptography in a Personal Digital Assistant Device
    Martinez-Ramos, Luis
    Lopez-Garcia, L.
    Rodriguez-Henriquez, F.
    JOURNAL OF APPLIED RESEARCH AND TECHNOLOGY, 2011, 9 (03) : 324 - 334
  • [35] Biometric Identity-Based Cryptography for e-Government Environment
    Aljeaid, Dania
    Ma, Xiaoqi
    Langensiepen, Caroline
    2014 SCIENCE AND INFORMATION CONFERENCE (SAI), 2014, : 581 - 588
  • [36] Datagram Transport Layer Security Protocol with Identity-Based Cryptography
    School of Computer, National University of Defense Technology, Changsha
    410073, China
    Ruan Jian Xue Bao, (90-97):
  • [37] SIMULATION OF AN IDENTITY-BASED CRYPTOGRAPHY SCHEME FOR AD HOC NETWORKS
    Mihai-Lica, Pura
    Victor-Valeriu, Patriciu
    Ion, Bica
    SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 135 - 139
  • [38] Body Sensor Network Security: An Identity-Based Cryptography Approach
    Tan, Chiu C.
    Wang, Haodong
    Zhong, Sheng
    Li, Qun
    WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2008, : 148 - 153
  • [39] Securing wireless sensor networks: an identity-based cryptography approach
    Szczechowiak, Piotr
    Scott, Michael
    Collier, Martin
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2010, 8 (3-4) : 182 - 192
  • [40] Distributed Private-Key Generators for Identity-Based Cryptography
    Kate, Aniket
    Goldberg, Ian
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 436 - 453