Academic literature on the topic 'IBE (Identity Based Encryption)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'IBE (Identity Based Encryption).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "IBE (Identity Based Encryption)"

1

Le, Xuan Lam, Le Nhat Bui, and Viet Cuong Trinh. "An Efficient Wildcarded Identity-Based Encryption Scheme." Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 16, no. 1 (2025): 543–59. https://doi.org/10.58346/jowua.2025.i1.032.

Full text
Abstract:
In the Identity-based encryption (IBE) scheme user’s public key is exactly the user’s identity, it thus doesn’t need to use expensive certificates in certified public key cryptography. Hierarchical identity-based encryption (HIBE) is the extension of IBE to overcome the bottleneck problem of the Private Key Generator and to increase the security of the IBE scheme. However, similar to IBE scheme, HIBE scheme still doesn’t support flexible one-to-many encrypting. To deal with this problem, Identity-based encryption with wildcards (WIBE) was introduced by Abdalla et al at ICALP conference in 2006
APA, Harvard, Vancouver, ISO, and other styles
2

Tseng, Yi-Fan, Chun-I. Fan, and Chih-Wen Lin. "Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption." JUCS - Journal of Universal Computer Science 25, no. (3) (2019): 182–202. https://doi.org/10.3217/jucs-025-03-0182.

Full text
Abstract:
Ciphertext-policy attribute-based encryption (CP-ABE) is an access control mechanism where a data provider encrypts a secret message and then sends the ciphertext to the receivers according to the access policy which she/he decides. If the attributes of the receivers match the access policy, then they can decrypt the ciphertext. This paper shows a relation between CP-ABE and identity-based encryption (IBE), and presents a bi-directional conversion between an access structure and identities. By the proposed conversion, the CP-ABE scheme constructed from an IBE scheme will inherit the features,
APA, Harvard, Vancouver, ISO, and other styles
3

Kim, Jongkil. "Backward Compatible Identity-Based Encryption." Sensors 23, no. 9 (2023): 4181. http://dx.doi.org/10.3390/s23094181.

Full text
Abstract:
In this paper, we present a new identity-based encryption (IBE) system that is named Backward Compatible Identity-based Encryption (BC-IBE). Our BC-IBE is proposed to solve the problem caused by the out-of-synchronization between users’ private keys and ciphertexts. Encryption systems such as revocable IBE or revocable Attribute-based Encryption (ABE) often require updating private keys to revoke users after a certain time period. However, in those schemes, an updated key can be used to decrypt the ciphertexts created only during the current time period. Once the key is updated and the previou
APA, Harvard, Vancouver, ISO, and other styles
4

Mary, Theresia, Octara Pribadi, and Leony Hoki. "Application of Bounded Collusion for Identity-Based Encryption Using the Identity Based Encryption Algorithm." Journal of Artificial Intelligence and Engineering Applications (JAIEA) 4, no. 3 (2025): 2184–88. https://doi.org/10.59934/jaiea.v4i3.1129.

Full text
Abstract:
This research aims to design and develop an identity encryption application using the bounded collusion method with the implementation of the Identity Based Encryption (IBE) algorithm. The method combines IBE, bounded collusion, and key generation based on the user's email. The application was developed using Visual Basic. In its implementation, the application can perform text encryption and decryption while limiting the number of decryptions to a maximum of two times per identity, in accordance with the bounded collusion principle. The testing results show that the application effectively pr
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Peng Tao. "Secure Symmetric Key Fuzzy Identity-Based Encryption." Applied Mechanics and Materials 321-324 (June 2013): 2665–68. http://dx.doi.org/10.4028/www.scientific.net/amm.321-324.2665.

Full text
Abstract:
Symmetric key fuzzy Identity-Based Encryption (IBE) is a special type of IBE in secret key model. In this paper we extend the notion to the case of fuzzy Identity-Based Encryption, and give a formal definition of symmetric key fuzzy IBE and its security requirements. Moreover, we propose a construction of symmetric key fuzzy IBE based on the public key fuzzy IBE of Sahai and Waters, and prove its security.
APA, Harvard, Vancouver, ISO, and other styles
6

Luo, Song, and Ning Hu. "On the Anonymity of Identity-Based Encryption." Journal of Applied Mathematics 2013 (2013): 1–9. http://dx.doi.org/10.1155/2013/217480.

Full text
Abstract:
Anonymity of identity-based encryption (IBE) means that given a ciphertext, one cannot distinguish the target identity from a random identity. In this paper, we thoroughly discuss the anonymity of IBE systems. We found that the current definition of anonymity is obscure to describe some IBE systems, such as Gentry IBE system. Furthermore, current definition cannot express the degree of anonymity. So we divide the degree of anonymity into weak anonymity and strong anonymity based on indistinguishability between different games. For weakly anonymous IBE systems, the target identity in a cipherte
APA, Harvard, Vancouver, ISO, and other styles
7

Karrothu, Aravind, and Jasmine Norman. "A systematic analysis of identity based encryption (IBE)." International Journal of Knowledge-based and Intelligent Engineering Systems 25, no. 3 (2021): 343–56. http://dx.doi.org/10.3233/kes-210078.

Full text
Abstract:
Light-weight cryptography is a major research area due to the minimization of the size of the devices utilized for such services. The associated security threats do increase as their applications are more now. Identity-Based Encryption (IBE) with its wide range of cryptographic schemes and protocols is specifically found suitable for low-end devices that have much resource constraint. This work describes various schemes and protocols in IBE. In this paper an analysis of IBE schemes and the various attacks they are prone to are discussed. The future trends are found to be very promising and cha
APA, Harvard, Vancouver, ISO, and other styles
8

Zuo, Binger, Jiguo Li, Yichen Zhang, and Jian Shen. "Identity-Based Online/Offline Encryption Scheme from LWE." Information 15, no. 9 (2024): 539. http://dx.doi.org/10.3390/info15090539.

Full text
Abstract:
With quantum computers, the quantum resistance of cryptographic systems has gradually attracted attention. To overcome the shortcoming of existing identity-based encryption (IBE) schemes in resisting quantum attacks, we introduce an IBE scheme based on learning with errors (LWE). In addition, devices with limited computing power are becoming increasingly common in practice, making it increasingly important to improve the efficiency of online computation of encryption algorithms. The classic solution is to directly improve the efficiency of the Gaussian sampling algorithm, thereby increasing th
APA, Harvard, Vancouver, ISO, and other styles
9

Shermina, Latha R, and Sreenithi R. "IDENTITY-BASED ENCRYPTION: A SECURE METHOD FOR DATA PROTECTION." International Journal of Engineering Research and Sustainable Technologies (IJERST) 2, no. 3 (2024): 16–22. https://doi.org/10.63458/ijerst.v2i3.88.

Full text
Abstract:
Identity-Based Encryption (IBE) is a fundamental cryptographic technology that provides a powerful answer to the problemsassociated with protecting sensitive information in contemporary digital settings. In contrast to conventional encryptiontechniques, which depend on pre-existing public keys linked to certain entities, IBE uses distinct identifiers, like usernamesor email addresses, as public keys. This method not only makes encrypted communication more flexible and accessible, butit also streamlines the key management procedure. Identity-Based Encryption is covered in detail in this study,
APA, Harvard, Vancouver, ISO, and other styles
10

Andal, S., Tasneem Tahera, M. MeghanaMary, G. C. Ranjitha, and N.A Deepak. "IMPLEMENTING CLOUD REVOCATION AUTHORITY WITH IDENTITY BASED ENCRYPTION AND ITS APPLICATIONS." International Journal of Research - Granthaalayah 5, (4) RACSIT (2017): 38–40. https://doi.org/10.5281/zenodo.572292.

Full text
Abstract:
Identity-based encryption (IBE) is a public key cryptosystem(encoding and decoding) and eliminates the demands of public key infrastructure(PKI) and certificate administration in conventional public key settings. Due to the absence of PKI, the revocation problem is a critical issue in IBE settings. Several revocable IBE schemes have been proposed regarding this issue. Quite recently, by embedding an outsourcing computation technique into IBE, a revocable IBE scheme with a key-update cloud service provider (KU-CSP) was proposed. However, their scheme has two shortcomings. One is that the comput
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "IBE (Identity Based Encryption)"

1

De, Caro Angelo. "On the Generalizations of Identity-Based Encryption." Doctoral thesis, Universita degli studi di Salerno, 2013. http://hdl.handle.net/10556/899.

Full text
Abstract:
2011 - 2012<br>Today public-key cryptographic is widely deployed and successfully used but still a major drawback exists. In fact, from encrypted data a party can either decrypt or cannot learn anything at all about the message other than intentionally leaked information such as its length. In the recent years, the cloud computing paradigm has emerged as the new standard to use computing resources, such as storage devices, that are delivered as a service over a network. In such a scenario, the notion of public key cryptography is not enough. It would be desirable to specify a decryption p
APA, Harvard, Vancouver, ISO, and other styles
2

Odyurt, Uraz. "Application of Fuzzy Logic in Identity-Based Cryptography." Thesis, Linnéuniversitetet, Institutionen för matematik (MA), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-35134.

Full text
Abstract:
This work explains the fundamental definitions required to define and create Fuzzy Identity-Based Encryption schemes as an error-tolerant version of Identity-Based Encryption schemes, along with three different examples of such creations. These examples are Sahai-Waters' FIBE, Baek et al.'s EFIBE-I and EFIBE-II. The required Set-up, Key Generation, Encryption and Decryption algorithms for each scheme are formalized and the proofs of security using the Selective-ID model are introduced. Subtle differences between the three schemes are discussed, including their computational efficiency comparis
APA, Harvard, Vancouver, ISO, and other styles
3

Hedges, Mary. "Elliptic curve cryptography and identity-based encryption." Connect to online resource, 2007. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1442908.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Srinivasan, Sriramkrishnan. "New security notions for identity based encryption." Thesis, Royal Holloway, University of London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.529038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tam, Tony. "Identity-Based Encryption on resource constrained embedded system." Thesis, California State University, Long Beach, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1569592.

Full text
Abstract:
<p> The use of smart embedded device has been growing rapidly recently because of the miniaturization of sensors and platforms. A resource-efficient Public Key Cryptography (PKC) is very desirable for the resource-constrained embedded system. Whereas most public key security protocols requires both public and private keys to be generated together, Identity Based Encryption (IBE), a public key cryptography protocol, allows the public key to be generated from an arbitrary string. IBE has been actively researched and deployed, but conventional IBE primitives are still computationally demanding an
APA, Harvard, Vancouver, ISO, and other styles
6

Germouty, Paul. "Identity-based cryptography." Thesis, Limoges, 2018. http://www.theses.fr/2018LIMO0041/document.

Full text
Abstract:
Dans cette thèse nous étudions les possibilités que les chiffrements basés sur l’identité offrent quand ils sont utilisés dans un but différent qu’un simple chiffrement. Nous avons pu généraliser différents types de chiffrement basés sur l’identité en une nouvelle primitive nommé Downgradable Identity-based Encryption (DIBE). Nous avons trouvé un moyen générique de transformer de simple IBE en des IBE en blanc, dans le cas où l’IBE est affine nous rendons le coût de communication très faible (de linéaire à logarithmique). Ces deux primitives ont donné lieux à différentes applications : les chi
APA, Harvard, Vancouver, ISO, and other styles
7

Kwok, Hon-man Sammy, and 郭漢文. "A scalable and secure networking paradigm using identity-based cryptography." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B46971713.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Qinyi. "Lattice public-key encryption: Richer, tighter, stronger." Thesis, Queensland University of Technology, 2017. https://eprints.qut.edu.au/107651/1/Qinyi_Li_Thesis.pdf.

Full text
Abstract:
Public-key encryption allows anyone to encrypt messages that only the intended recipient can decrypt. It is an essential component of most network security protocols; however, the algorithms in widespread use are inherently vulnerable to attacks by quantum computers, should they become a practical reality. This thesis looks at public-key encryption from computationally hard problems based on high-dimensional lattices, believed to resist classical and quantum attacks. On those foundations, it proposes three post-quantum public-key encryption schemes, respectively featuring richer access control
APA, Harvard, Vancouver, ISO, and other styles
9

Incebacak, Davut. "Design And Implementation Of A Secure And Searchable Audit Logging System." Master's thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/2/12608431/index.pdf.

Full text
Abstract:
Logs are append-only time-stamped records to represent events in computers or network devices. Today, in many real-world networking applications, logging is a central service however it is a big challenge to satisfy the conflicting requirements when the security of log records is of concern. On one hand, being kept on mostly untrusted hosts, the logs should be preserved against unauthorized modifications and privacy breaches. On the other, serving as the primary evidence for digital crimes, logs are often needed for analysis by investigators. In this thesis, motivated by these requirements we
APA, Harvard, Vancouver, ISO, and other styles
10

Prest, Thomas. "Gaussian sampling in lattice-based cryptography." Thesis, Paris, Ecole normale supérieure, 2015. http://www.theses.fr/2015ENSU0045/document.

Full text
Abstract:
Bien que relativement récente, la cryptographie à base de réseaux euclidiens s’est distinguée sur de nombreux points, que ce soit par la richesse des constructions qu’elle permet, par sa résistance supposée à l’avènement des ordinateursquantiques ou par la rapidité dont elle fait preuve lorsqu’instanciée sur certaines classes de réseaux. Un des outils les plus puissants de la cryptographie sur les réseaux est le Gaussian sampling. À très haut niveau, il permet de prouver qu’on connaît une base particulière d’un réseau, et ce sans dévoiler la moindre information sur cette base. Il permet de réa
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "IBE (Identity Based Encryption)"

1

Chatterjee, Sanjit, and Palash Sarkar. Identity-Based Encryption. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-9383-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

1969-, Sarkar Palash, and SpringerLink (Online service), eds. Identity-Based Encryption. Springer Science+Business Media, LLC, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

A, Szygenda Stephen, ed. Security for wireless sensor networks using identity-based cryptography. CRC Press/Taylor & Francis Group, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fischer-Hübner, Simone. Policies and Research in Identity Management: Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedings. Springer Berlin Heidelberg, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Helger, Lipmaa, and SpringerLink (Online service), eds. E-Voting and Identity: Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chatterjee, Sanjit, and Palash Sarkar. Identity-Based Encryption. Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sarkar, Sanjit Chatterjee Palash. Identity-Based Encryption. Springer, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Martin. Introduction to Identity-Based Encryption. Artech House Publishers, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Identity-based cryptography. IOS Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vahlis, Eugene. Chosen ciphertext security in identity based encryption. 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "IBE (Identity Based Encryption)"

1

Chatterjee, Sanjit, and Palash Sarkar. "Further IBE Constructions." In Identity-Based Encryption. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-9383-0_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chatterjee, Sanjit, and Palash Sarkar. "IBE Without Pairing." In Identity-Based Encryption. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-9383-0_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chatterjee, Sanjit, and Palash Sarkar. "Boneh-Franklin IBE and its Variants." In Identity-Based Encryption. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-9383-0_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chatterjee, Sanjit, and Palash Sarkar. "IBE in Adaptive-Identity Model Without Random Oracles." In Identity-Based Encryption. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-9383-0_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shah, Parth, and Priteshkumar Prajapati. "Identity-Based Encryption (IBE)-Based Improved Data Possession Techniques." In ICT Systems and Sustainability. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-5652-4_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dharamadhikari, Dipa D., and Sharvari C. Tamane. "Secure Cloud-Based E-Healthcare System Using Ciphertext-Policy Identity-Based Encryption (CP-IBE)." In Smart Innovation, Systems and Technologies. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0077-0_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Yi, Rongmao Chen, Xinyi Huang, Jianting Ning, Baosheng Wang, and Moti Yung. "Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-Secure IBE." In Lecture Notes in Computer Science. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-92075-3_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gagné, Martin. "Identity-Based Encryption." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_148.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Jiang, and Zhenfeng Zhang. "Identity-Based Encryption." In Lattice-Based Cryptosystems. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-8427-5_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gautam, Tanvi. "Identity—Based Encryption." In Emerging Security Algorithms and Techniques, edited by Aditya Thakkar and Nitish Pathak. Chapman and Hall/CRC, 2019. http://dx.doi.org/10.1201/9781351021708-10.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "IBE (Identity Based Encryption)"

1

Qi, Zhenghua, Gang Yang, Xunyi Ren, and Qiang Zhou. "Compressible Identity-Based Fully Homomorphic Encryption." In 2024 4th International Conference on Blockchain Technology and Information Security (ICBCTIS). IEEE, 2024. https://doi.org/10.1109/icbctis64495.2024.00013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Tianqiao, Mingming Jiang, and Hui Ge. "Fuzzy Identity-Based Encryption Scheme Based on RLWE." In 2024 2nd International Conference on Computer, Vision and Intelligent Technology (ICCVIT). IEEE, 2024. https://doi.org/10.1109/iccvit63928.2024.10872574.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Liang, Yuan, Giovanni Di Crescenzo, Haining Wang, and Zahir Patni. "Efficient Identity-Based Encryption with Minimal Server Trust." In 2024 43rd International Symposium on Reliable Distributed Systems (SRDS). IEEE, 2024. https://doi.org/10.1109/srds64841.2024.00020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

"SECURING WEB SERVICES USING IDENTITY-BASED ENCRYPTION (IBE)." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2006. http://dx.doi.org/10.5220/0002103504130418.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ehmke, Martin, Harri Forsgren, Kaj Grahn, Jonny Karlsson, Timo Karvi, and Goran Pulkkis. "Securing Control Signaling in Mobile IPv6 with Identity-Based Encryption." In InSITE 2009: Informing Science + IT Education Conference. Informing Science Institute, 2009. http://dx.doi.org/10.28945/3371.

Full text
Abstract:
Control signaling messages in Mobile IPv6 are mainly used to inform the home agent (HA) and the correspondent node (CN) about the mobile node’s (MN’s) new address when its network attachment point is changed. In order to prevent various security attacks, these messages must be protected. In the current standard, the control signaling messages between a HA and a MN are authenticated using IPSec, often with IKEv2 and X.509 certificates. Control signaling messages between a MN and a CN are currently protected by an effective but insecure protocol, known as Return Routability. Using IBE (Identity-
APA, Harvard, Vancouver, ISO, and other styles
6

Sharma, Rupali, and Bharti Joshi. "H-IBE: Hybrid-identity based encryption approach for cloud security with outsourced revocation." In 2016 International conference on Signal Processing, Communication, Power and Embedded System (SCOPES). IEEE, 2016. http://dx.doi.org/10.1109/scopes.2016.7955629.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mohd Yussoff, Yusnani, Habibah Hashim, and Mohd Dani Baba. "Analysis of trusted identity based encryption (IBE-trust) protocol for Wireless Sensor Networks." In 2012 IEEE Control and System Graduate Research Colloquium (ICSGRC). IEEE, 2012. http://dx.doi.org/10.1109/icsgrc.2012.6287183.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Xu An, Xiaoyuan Yang, and Junru Hu. "CCA-secure Identity Based Proxy Re-encryption Based on a Variant of BB1 IBE." In 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing. IEEE, 2010. http://dx.doi.org/10.1109/nswctc.2010.263.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bai, Qing-hai. "Comparative research on two kinds of certification systems of the public key infrastructure (PKI) and the identity based encryption (IBE)." In 2012 Cross Strait Quad-Regional Radio Science and Wireless Technology Conference (CSQRWC). IEEE, 2012. http://dx.doi.org/10.1109/csqrwc.2012.6294997.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sakai, Ryuichi. "Flexible identity based attribute encryption from identity based broadcast encryption." In 2008 International Symposium on Information Theory and Its Applications (ISITA). IEEE, 2008. http://dx.doi.org/10.1109/isita.2008.4895435.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "IBE (Identity Based Encryption)"

1

Schertler, Mark J. Evaluation of Identity Based Encryption (IBE) Capabilities for the US DHS S&T Secure Wireless Communications Program and the CAN-US Security Enhanced Blackberry Trial. Defense Technical Information Center, 2007. http://dx.doi.org/10.21236/ada482302.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Appenzeller, G., L. Martin, and M. Schertler. Identity-Based Encryption Architecture and Supporting Data Structures. RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Groves, M. Elliptic Curve-Based Certificateless Signatures for Identity-Based Encryption (ECCSI). RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6507.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nove, Charles, Andrew Fisher, Alex Mitsdarfer, and Tiffany Pierce. Securing MQTT with Identity-Based Encryption: Secure MQTT v1.0 Protocol Specification. Office of Scientific and Technical Information (OSTI), 2024. http://dx.doi.org/10.2172/2462998.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hengartner, Urs, and Peter Steenkiste. Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada457869.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Martin, L., and M. Schertler. Using the Boneh-Franklin and Boneh-Boyen Identity-Based Encryption Algorithms with the Cryptographic Message Syntax (CMS). RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5409.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!