Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Cifrado fundado sobre identidad")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 175

  • Page / 7
Export

Selection :

  • and

Generic Constructions of Identity-Based and Certificateless KEMsBENTAHAR, K; FARSHIM, P; MALONE-LEE, J et al.Journal of cryptology. 2008, Vol 21, Num 2, pp 178-199, issn 0933-2790, 22 p.Article

Cryptanalysis of two identification schemes based on an ID-based cryptosystemTANG, Q; MITCHELL, C. J.IEE proceedings. Communications. 2005, Vol 152, Num 5, pp 723-724, issn 1350-2425, 2 p.Article

Impersonation Attack on a Strong ID-Based Key DistributionHWANG, Jungyeon; LIM, Jongin; LEE, Donghoon et al.IEICE transactions on communications. 2008, Vol 91, Num 8, pp 2702-2703, issn 0916-8516, 2 p.Article

Teaching an Old TPM New Tricks: Repurposing for Identity-Based Signatures : Identity IntegrityWEIHAN GOH; CHAI KIAT YEO.IEEE security & privacy. 2013, Vol 11, Num 5, pp 28-35, issn 1540-7993, 8 p.Article

Strong ID-Based Key DistributionIK RAE JEONG; JEONG OK KWON; DONG HOON LEE et al.IEICE transactions on communications. 2008, Vol 91, Num 1, pp 306-308, issn 0916-8516, 3 p.Article

Cryptanalysis of Wang et al.'s improved anonymous multi-receiver identity-based encryption schemeHUIXIAN LI; LIAOJUN PANG.IET information security (Print). 2014, Vol 8, Num 1, pp 8-11, issn 1751-8709, 4 p.Article

Security Proofs for Identity-Based Identification and Signature SchemesBELLARE, Mihir; NAMPREMPRE, Chanathip; NEVEN, Gregory et al.Journal of cryptology. 2009, Vol 22, Num 1, pp 1-61, issn 0933-2790, 61 p.Article

Scaling of multistage interpolatorsOLSSON, Mattias; LÖWENBORG, Per; JOHANSSON, Hakan et al.EUSIPCO. Conference. 2004, isbn 3-200-00148-8, 3Vol, volII, 1413-1416Conference Paper

Towards Practical Black-Box Accountable Authority IBE: Weak Black-Box Traceability With Short Ciphertexts and Private KeysLIBERT, Benoit; VERGNAUD, Damien.IEEE transactions on information theory. 2011, Vol 57, Num 10, pp 7189-7204, issn 0018-9448, 16 p.Article

New certificateless short signature schemeDEBIAO HE; BAOJUN HUANG; JIANHUA CHEN et al.IET information security (Print). 2013, Vol 7, Num 2, pp 113-117, issn 1751-8709, 5 p.Article

Further Analysis of a Practical Hierarchical Identity-Based Encryption SchemeYING SUN; YONG YU; YI MU et al.IEICE transactions on information and systems. 2012, Vol 95, Num 6, pp 1690-1693, issn 0916-8532, 4 p.Article

Analysis of an authenticated identity-based multicast schemeLIN, X.-J; WU, C.-K; LIU, F et al.IET communications (Print). 2008, Vol 2, Num 7, pp 935-937, issn 1751-8628, 3 p.Article

Use of RFID technologyCHOWDHURY, Probir Roy.Computer law review international. 2006, Num 6, pp 173-177, 5 p.Article

Impersonation attack on a dynamic ID-based remote user authentication scheme using smart cardsKU, Wei-Chi; CHANG, Shen-Tien.IEICE transactions on communications. 2005, Vol 88, Num 5, pp 2165-2167, issn 0916-8516, 3 p.Article

On the Security of a Certificateless Aggregate Signature SchemeSHIM, Kyung-Ah.IEEE communications letters. 2011, Vol 15, Num 10, pp 1136-1138, issn 1089-7798, 3 p.Article

Dispatch: Secure, Resilient Mobile ReportingBISCUITWALA, Kanak; BULT, Willem; LECUYER, Mathias et al.Computer communication review. 2013, Vol 43, Num 4, pp 459-460, issn 0146-4833, 2 p.Conference Paper

Wildcarded Identity-Based EncryptionABDALLA, Michel; BIRKETT, James; CATALANO, Dario et al.Journal of cryptology. 2011, Vol 24, Num 1, pp 42-82, issn 0933-2790, 41 p.Article

Invisible marker based augmented reality systemPARK, Hanhoon; PARK, Jong-Il.SPIE proceedings series. 2005, isbn 0-8194-5976-3, Part I, 501-508Conference Paper

Automated hand shape verification using HMMSUN, Dong-Mei; QIU, Zheng-Ding.International Conference on Signal Processing. 2004, pp 2274-2277, isbn 0-7803-8406-7, 4 p.Conference Paper

Efficient ID-based multiproxy multisignature without bilinear maps in ROMTIWARI, Namita; PADHYE, Sahadeo; DEBIAO HE et al.Annales des télécommunications. 2013, Vol 68, Num 3-4, pp 231-237, issn 0003-4347, 7 p.Article

On the Security of an Efficient and Secure Dynamic ID-Based Remote User Authentication SchemeYOON, Eun-Jun; YOO, Kee-Young.IEICE transactions on information and systems. 2012, Vol 95, Num 6, pp 1684-1686, issn 0916-8532, 3 p.Article

New identity-based key-insulated convertible multi-authenticated encryption schemeHSU, Chien-Lung; LIN, Han-Yu.Journal of network and computer applications. 2011, Vol 34, Num 5, pp 1724-1731, issn 1084-8045, 8 p.Article

Strongly unforgeable ID-based signatures without random oraclesSATO, Chifumi; OKAMOTO, Takeshi; OKAMOTO, Eiji et al.International journal of applied cryptography (Print). 2010, Vol 2, Num 1, pp 35-45, issn 1753-0563, 11 p.Article

Cryptanalysis and Improvement of an Efficient Certificateless Signature SchemeJIGUO LI; XINYI HUANG; YI MU et al.Journal of communication and networks. 2008, Vol 10, Num 1, pp 10-17, issn 1229-2370, 8 p.Article

Audiovisual Speech Synchrony Measure : Application to BiometricsBREDIN, Hervé; CHOLLET, Gérard.EURASIP Journal on Advances in Signal Processing (Print). 2007, Vol 2007, Num 24, pp 1-11, issn 1687-6172, 11 p.Article

  • Page / 7