Books on the topic 'Identity based encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 26 books for your research on the topic 'Identity based encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Chatterjee, Sanjit, and Palash Sarkar. Identity-Based Encryption. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-9383-0.
Full text1969-, Sarkar Palash, and SpringerLink (Online service), eds. Identity-Based Encryption. Springer Science+Business Media, LLC, 2011.
Find full textA, Szygenda Stephen, ed. Security for wireless sensor networks using identity-based cryptography. CRC Press/Taylor & Francis Group, 2013.
Find full textFischer-Hübner, Simone. Policies and Research in Identity Management: Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedings. Springer Berlin Heidelberg, 2013.
Find full textHelger, Lipmaa, and SpringerLink (Online service), eds. E-Voting and Identity: Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2012.
Find full textConditional Identity Broadcast based Proxy Re-Encryption Technique for Data Encryption in Cloud. ASDF International, 2017.
Find full textCamenisch, Jan, Kai Rannenberg, and Ahmad Sabouri. Attribute-Based Credentials for Trust: Identity in the Information Society. Springer International Publishing AG, 2016.
Find full textCamenisch, Jan, Kai Rannenberg, and Ahmad Sabouri. Attribute-based Credentials for Trust: Identity in the Information Society. Springer, 2014.
Find full textCamenisch, Jan, Kai Rannenberg, and Ahmad Sabouri. Attribute-Based Credentials for Trust: Identity in the Information Society. Springer, 2014.
Find full textPatil, Harsh Kupwade, and Stephen A. Szygenda. Security for Wireless Sensor Networks Using Identity-Based Cryptography. Auerbach Publishers, Incorporated, 2012.
Find full textPatil, Harsh Kupwade, and Stephen A. Szygenda. Security for Wireless Sensor Networks Using Identity-Based Cryptography. Auerbach Publishers, Incorporated, 2012.
Find full textPatil, Harsh Kupwade, and Stephen A. Szygenda. Security for Wireless Sensor Networks Using Identity-Based Cryptography. Auerbach Publishers, Incorporated, 2016.
Find full textPatil, Harsh Kupwade, and Stephen A. Szygenda. Security for Wireless Sensor Networks Using Identity-Based Cryptography. Auerbach Publishers, Incorporated, 2012.
Find full textPatil, Harsh Kupwade, and Stephen A. Szygenda. Security for Wireless Sensor Networks Using Identity-Based Cryptography. Auerbach Publishers, Incorporated, 2012.
Find full textFischer-Hübner, Simone, Elisabeth de Leeuw, Jimmy C. Tseng, and John Borking. Policies and Research in Identity Management: First IFIP WG 11.6 Working Conference on Policies and Research in Identity Management , RSM ... and Communication Technology ). Springer, 2010.
Find full textFischer-Hübner, Simone, Elisabeth de Leeuw, Jimmy C. Tseng, and John Borking. Policies and Research in Identity Management: First IFIP WG 11. 6 Working Conference on Policies and Research in Identity Management , RSM Erasmus University, Rotterdam, the Netherlands, October 11-12 2007. Springer, 2010.
Find full textMitchell, Chris J., Simone Fischer-Hübner, and Elisabeth de Leeuw. Policies and Research in Identity Management: Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013, Proceedings. Springer, 2015.
Find full textFischer-Hübner, Simone, Lothar Fritsch, and Elisabeth de Leeuw. Policies and Research in Identity Management: Second IFIP WG 11. 6 Working Conference, IDMAN 2010, Oslo, Norway, November 18-19, 2010, Proceedings. Springer, 2010.
Find full textFischer-Hübner, Simone, Lothar Fritsch, and Elisabeth de Leeuw. Policies and Research in Identity Management: Second IFIP WG 11.6 Working Conference, IDMAN 2010, Oslo, Norway, November 18-19, 2010, Proceedings ... and Communication Technology ). Springer, 2014.
Find full textKiayias, Aggelos, and Helger Lipmaa. E-Voting and Identity: Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-20, 2011, Revised Selected Papers. Springer, 2012.
Find full textMartin, Keith M. Public-Key Encryption. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0005.
Full text