Academic literature on the topic 'IBE (Identity Based Encryption)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'IBE (Identity Based Encryption).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "IBE (Identity Based Encryption)"
Le, Xuan Lam, Le Nhat Bui, and Viet Cuong Trinh. "An Efficient Wildcarded Identity-Based Encryption Scheme." Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 16, no. 1 (2025): 543–59. https://doi.org/10.58346/jowua.2025.i1.032.
Full textTseng, Yi-Fan, Chun-I. Fan, and Chih-Wen Lin. "Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption." JUCS - Journal of Universal Computer Science 25, no. (3) (2019): 182–202. https://doi.org/10.3217/jucs-025-03-0182.
Full textKim, Jongkil. "Backward Compatible Identity-Based Encryption." Sensors 23, no. 9 (2023): 4181. http://dx.doi.org/10.3390/s23094181.
Full textMary, Theresia, Octara Pribadi, and Leony Hoki. "Application of Bounded Collusion for Identity-Based Encryption Using the Identity Based Encryption Algorithm." Journal of Artificial Intelligence and Engineering Applications (JAIEA) 4, no. 3 (2025): 2184–88. https://doi.org/10.59934/jaiea.v4i3.1129.
Full textLiu, Peng Tao. "Secure Symmetric Key Fuzzy Identity-Based Encryption." Applied Mechanics and Materials 321-324 (June 2013): 2665–68. http://dx.doi.org/10.4028/www.scientific.net/amm.321-324.2665.
Full textLuo, Song, and Ning Hu. "On the Anonymity of Identity-Based Encryption." Journal of Applied Mathematics 2013 (2013): 1–9. http://dx.doi.org/10.1155/2013/217480.
Full textKarrothu, Aravind, and Jasmine Norman. "A systematic analysis of identity based encryption (IBE)." International Journal of Knowledge-based and Intelligent Engineering Systems 25, no. 3 (2021): 343–56. http://dx.doi.org/10.3233/kes-210078.
Full textZuo, Binger, Jiguo Li, Yichen Zhang, and Jian Shen. "Identity-Based Online/Offline Encryption Scheme from LWE." Information 15, no. 9 (2024): 539. http://dx.doi.org/10.3390/info15090539.
Full textShermina, Latha R, and Sreenithi R. "IDENTITY-BASED ENCRYPTION: A SECURE METHOD FOR DATA PROTECTION." International Journal of Engineering Research and Sustainable Technologies (IJERST) 2, no. 3 (2024): 16–22. https://doi.org/10.63458/ijerst.v2i3.88.
Full textAndal, S., Tasneem Tahera, M. MeghanaMary, G. C. Ranjitha, and N.A Deepak. "IMPLEMENTING CLOUD REVOCATION AUTHORITY WITH IDENTITY BASED ENCRYPTION AND ITS APPLICATIONS." International Journal of Research - Granthaalayah 5, (4) RACSIT (2017): 38–40. https://doi.org/10.5281/zenodo.572292.
Full textDissertations / Theses on the topic "IBE (Identity Based Encryption)"
De, Caro Angelo. "On the Generalizations of Identity-Based Encryption." Doctoral thesis, Universita degli studi di Salerno, 2013. http://hdl.handle.net/10556/899.
Full textOdyurt, Uraz. "Application of Fuzzy Logic in Identity-Based Cryptography." Thesis, Linnéuniversitetet, Institutionen för matematik (MA), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-35134.
Full textHedges, Mary. "Elliptic curve cryptography and identity-based encryption." Connect to online resource, 2007. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1442908.
Full textSrinivasan, Sriramkrishnan. "New security notions for identity based encryption." Thesis, Royal Holloway, University of London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.529038.
Full textTam, Tony. "Identity-Based Encryption on resource constrained embedded system." Thesis, California State University, Long Beach, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1569592.
Full textGermouty, Paul. "Identity-based cryptography." Thesis, Limoges, 2018. http://www.theses.fr/2018LIMO0041/document.
Full textKwok, Hon-man Sammy, and 郭漢文. "A scalable and secure networking paradigm using identity-based cryptography." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B46971713.
Full textLi, Qinyi. "Lattice public-key encryption: Richer, tighter, stronger." Thesis, Queensland University of Technology, 2017. https://eprints.qut.edu.au/107651/1/Qinyi_Li_Thesis.pdf.
Full textIncebacak, Davut. "Design And Implementation Of A Secure And Searchable Audit Logging System." Master's thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/2/12608431/index.pdf.
Full textPrest, Thomas. "Gaussian sampling in lattice-based cryptography." Thesis, Paris, Ecole normale supérieure, 2015. http://www.theses.fr/2015ENSU0045/document.
Full textBooks on the topic "IBE (Identity Based Encryption)"
Chatterjee, Sanjit, and Palash Sarkar. Identity-Based Encryption. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-9383-0.
Full text1969-, Sarkar Palash, and SpringerLink (Online service), eds. Identity-Based Encryption. Springer Science+Business Media, LLC, 2011.
Find full textA, Szygenda Stephen, ed. Security for wireless sensor networks using identity-based cryptography. CRC Press/Taylor & Francis Group, 2013.
Find full textFischer-Hübner, Simone. Policies and Research in Identity Management: Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedings. Springer Berlin Heidelberg, 2013.
Find full textHelger, Lipmaa, and SpringerLink (Online service), eds. E-Voting and Identity: Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2012.
Find full textBook chapters on the topic "IBE (Identity Based Encryption)"
Chatterjee, Sanjit, and Palash Sarkar. "Further IBE Constructions." In Identity-Based Encryption. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-9383-0_8.
Full textChatterjee, Sanjit, and Palash Sarkar. "IBE Without Pairing." In Identity-Based Encryption. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-9383-0_9.
Full textChatterjee, Sanjit, and Palash Sarkar. "Boneh-Franklin IBE and its Variants." In Identity-Based Encryption. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-9383-0_4.
Full textChatterjee, Sanjit, and Palash Sarkar. "IBE in Adaptive-Identity Model Without Random Oracles." In Identity-Based Encryption. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-9383-0_7.
Full textShah, Parth, and Priteshkumar Prajapati. "Identity-Based Encryption (IBE)-Based Improved Data Possession Techniques." In ICT Systems and Sustainability. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-5652-4_25.
Full textDharamadhikari, Dipa D., and Sharvari C. Tamane. "Secure Cloud-Based E-Healthcare System Using Ciphertext-Policy Identity-Based Encryption (CP-IBE)." In Smart Innovation, Systems and Technologies. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0077-0_21.
Full textWang, Yi, Rongmao Chen, Xinyi Huang, Jianting Ning, Baosheng Wang, and Moti Yung. "Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-Secure IBE." In Lecture Notes in Computer Science. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-92075-3_15.
Full textGagné, Martin. "Identity-Based Encryption." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_148.
Full textZhang, Jiang, and Zhenfeng Zhang. "Identity-Based Encryption." In Lattice-Based Cryptosystems. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-8427-5_4.
Full textGautam, Tanvi. "Identity—Based Encryption." In Emerging Security Algorithms and Techniques, edited by Aditya Thakkar and Nitish Pathak. Chapman and Hall/CRC, 2019. http://dx.doi.org/10.1201/9781351021708-10.
Full textConference papers on the topic "IBE (Identity Based Encryption)"
Qi, Zhenghua, Gang Yang, Xunyi Ren, and Qiang Zhou. "Compressible Identity-Based Fully Homomorphic Encryption." In 2024 4th International Conference on Blockchain Technology and Information Security (ICBCTIS). IEEE, 2024. https://doi.org/10.1109/icbctis64495.2024.00013.
Full textZhang, Tianqiao, Mingming Jiang, and Hui Ge. "Fuzzy Identity-Based Encryption Scheme Based on RLWE." In 2024 2nd International Conference on Computer, Vision and Intelligent Technology (ICCVIT). IEEE, 2024. https://doi.org/10.1109/iccvit63928.2024.10872574.
Full textLiang, Yuan, Giovanni Di Crescenzo, Haining Wang, and Zahir Patni. "Efficient Identity-Based Encryption with Minimal Server Trust." In 2024 43rd International Symposium on Reliable Distributed Systems (SRDS). IEEE, 2024. https://doi.org/10.1109/srds64841.2024.00020.
Full text"SECURING WEB SERVICES USING IDENTITY-BASED ENCRYPTION (IBE)." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2006. http://dx.doi.org/10.5220/0002103504130418.
Full textEhmke, Martin, Harri Forsgren, Kaj Grahn, Jonny Karlsson, Timo Karvi, and Goran Pulkkis. "Securing Control Signaling in Mobile IPv6 with Identity-Based Encryption." In InSITE 2009: Informing Science + IT Education Conference. Informing Science Institute, 2009. http://dx.doi.org/10.28945/3371.
Full textSharma, Rupali, and Bharti Joshi. "H-IBE: Hybrid-identity based encryption approach for cloud security with outsourced revocation." In 2016 International conference on Signal Processing, Communication, Power and Embedded System (SCOPES). IEEE, 2016. http://dx.doi.org/10.1109/scopes.2016.7955629.
Full textMohd Yussoff, Yusnani, Habibah Hashim, and Mohd Dani Baba. "Analysis of trusted identity based encryption (IBE-trust) protocol for Wireless Sensor Networks." In 2012 IEEE Control and System Graduate Research Colloquium (ICSGRC). IEEE, 2012. http://dx.doi.org/10.1109/icsgrc.2012.6287183.
Full textWang, Xu An, Xiaoyuan Yang, and Junru Hu. "CCA-secure Identity Based Proxy Re-encryption Based on a Variant of BB1 IBE." In 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing. IEEE, 2010. http://dx.doi.org/10.1109/nswctc.2010.263.
Full textBai, Qing-hai. "Comparative research on two kinds of certification systems of the public key infrastructure (PKI) and the identity based encryption (IBE)." In 2012 Cross Strait Quad-Regional Radio Science and Wireless Technology Conference (CSQRWC). IEEE, 2012. http://dx.doi.org/10.1109/csqrwc.2012.6294997.
Full textSakai, Ryuichi. "Flexible identity based attribute encryption from identity based broadcast encryption." In 2008 International Symposium on Information Theory and Its Applications (ISITA). IEEE, 2008. http://dx.doi.org/10.1109/isita.2008.4895435.
Full textReports on the topic "IBE (Identity Based Encryption)"
Schertler, Mark J. Evaluation of Identity Based Encryption (IBE) Capabilities for the US DHS S&T Secure Wireless Communications Program and the CAN-US Security Enhanced Blackberry Trial. Defense Technical Information Center, 2007. http://dx.doi.org/10.21236/ada482302.
Full textAppenzeller, G., L. Martin, and M. Schertler. Identity-Based Encryption Architecture and Supporting Data Structures. RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5408.
Full textGroves, M. Elliptic Curve-Based Certificateless Signatures for Identity-Based Encryption (ECCSI). RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6507.
Full textNove, Charles, Andrew Fisher, Alex Mitsdarfer, and Tiffany Pierce. Securing MQTT with Identity-Based Encryption: Secure MQTT v1.0 Protocol Specification. Office of Scientific and Technical Information (OSTI), 2024. http://dx.doi.org/10.2172/2462998.
Full textHengartner, Urs, and Peter Steenkiste. Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada457869.
Full textMartin, L., and M. Schertler. Using the Boneh-Franklin and Boneh-Boyen Identity-Based Encryption Algorithms with the Cryptographic Message Syntax (CMS). RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5409.
Full text