Dissertations / Theses on the topic 'IBE (Identity Based Encryption)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 29 dissertations / theses for your research on the topic 'IBE (Identity Based Encryption).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
De, Caro Angelo. "On the Generalizations of Identity-Based Encryption." Doctoral thesis, Universita degli studi di Salerno, 2013. http://hdl.handle.net/10556/899.
Full textOdyurt, Uraz. "Application of Fuzzy Logic in Identity-Based Cryptography." Thesis, Linnéuniversitetet, Institutionen för matematik (MA), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-35134.
Full textHedges, Mary. "Elliptic curve cryptography and identity-based encryption." Connect to online resource, 2007. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1442908.
Full textSrinivasan, Sriramkrishnan. "New security notions for identity based encryption." Thesis, Royal Holloway, University of London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.529038.
Full textTam, Tony. "Identity-Based Encryption on resource constrained embedded system." Thesis, California State University, Long Beach, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1569592.
Full textGermouty, Paul. "Identity-based cryptography." Thesis, Limoges, 2018. http://www.theses.fr/2018LIMO0041/document.
Full textKwok, Hon-man Sammy, and 郭漢文. "A scalable and secure networking paradigm using identity-based cryptography." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B46971713.
Full textLi, Qinyi. "Lattice public-key encryption: Richer, tighter, stronger." Thesis, Queensland University of Technology, 2017. https://eprints.qut.edu.au/107651/1/Qinyi_Li_Thesis.pdf.
Full textIncebacak, Davut. "Design And Implementation Of A Secure And Searchable Audit Logging System." Master's thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/2/12608431/index.pdf.
Full textPrest, Thomas. "Gaussian sampling in lattice-based cryptography." Thesis, Paris, Ecole normale supérieure, 2015. http://www.theses.fr/2015ENSU0045/document.
Full textBrouilhet, Laura. "Généralisation des protocoles en cas multi-utilisateurs." Thesis, Limoges, 2020. http://www.theses.fr/2020LIMO0062.
Full textMisaghi, Mehran. "Um ambiente criptográfico baseado na identidade." Universidade de São Paulo, 2008. http://www.teses.usp.br/teses/disponiveis/3/3142/tde-15092008-135036/.
Full textZitouni, Mohammed. "L’étude et l’implémentation des algorithmes de couplages sur des courbes hyperelliptiques sur des corps premiers." Electronic Thesis or Diss., Paris 8, 2021. http://www.theses.fr/2021PA080031.
Full textDu, Rong. "Secure electronic tendering." Thesis, Queensland University of Technology, 2007. https://eprints.qut.edu.au/16606/1/Rong_Du_Thesis.pdf.
Full textDu, Rong. "Secure electronic tendering." Queensland University of Technology, 2007. http://eprints.qut.edu.au/16606/.
Full textKhandavilli, Ambica Pawan. "A MOBILE ROLE BASED ACCESS CONTROL SYSTEM USING IDENTITY BASED ENCRYPTION WITH NON-INTERACTIVE ZERO KNOWLEDGE PROOF OF AUTHENTICATION." 2012. http://hdl.handle.net/10222/14604.
Full textAgrawal, Shweta Prem. "Efficient, provably secure code constructions." Thesis, 2011. http://hdl.handle.net/2152/ETD-UT-2011-05-2675.
Full textLin, Chih-Wen, and 林稚雯. "Attribute-based Encryption from Identity-based Encryption." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/4jmp26.
Full textHuang, Ling-Ying, and 黃齡瑩. "Anonymous Multi-Receiver Identity-Based Encryption." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/cpt5zq.
Full textVahlis, Eugene. "Chosen ciphertext security in identity based encryption." 2007. http://link.library.utoronto.ca/eir/EIRdetail.cfm?Resources__ID=452820&T=F.
Full textWen, Ting-Hui, and 溫玎薈. "Identity-Based Broadcast Encryption Scheme with Keyword Search." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/07603382282619045997.
Full textYoshida, Kayo. "Boneh-Boyen Signatures and the Strong Diffie-Hellman Problem." Thesis, 2009. http://hdl.handle.net/10012/4219.
Full textTseng, Yi-Fan, and 曾一凡. "Anonymous Multi-Receiver Identity-Based Encryption with Complete CCA Security." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/rjq64z.
Full text"Identity based cryptography from pairings." 2006. http://library.cuhk.edu.hk/record=b5892794.
Full text"Identity-based cryptography from paillier cryptosystem." 2005. http://library.cuhk.edu.hk/record=b5892374.
Full textPan, Wen Chieh, and 潘彣杰. "Effective Identity-Based Encryption Schemes with Outsourced Revocation for Cloud Computing." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/25g23p.
Full textTseng, Yi-Fan, and 曾一凡. "Anonymous Multi-Receiver Identity-Based Encryption with Tight Reducible Full Security in the Standard Model." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/3f4ay2.
Full textKate, Aniket. "Distributed Key Generation and Its Applications." Thesis, 2010. http://hdl.handle.net/10012/5285.
Full text(6620474), Denis A. Ulybyshev. "Data Protection in Transit and at Rest with Leakage Detection." Thesis, 2019.
Find full text