To see the other types of publications on this topic, follow the link: Identity based encryption.

Books on the topic 'Identity based encryption'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 26 books for your research on the topic 'Identity based encryption.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Chatterjee, Sanjit, and Palash Sarkar. Identity-Based Encryption. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-9383-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

1969-, Sarkar Palash, and SpringerLink (Online service), eds. Identity-Based Encryption. Springer Science+Business Media, LLC, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

A, Szygenda Stephen, ed. Security for wireless sensor networks using identity-based cryptography. CRC Press/Taylor & Francis Group, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fischer-Hübner, Simone. Policies and Research in Identity Management: Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedings. Springer Berlin Heidelberg, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Helger, Lipmaa, and SpringerLink (Online service), eds. E-Voting and Identity: Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chatterjee, Sanjit, and Palash Sarkar. Identity-Based Encryption. Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sarkar, Sanjit Chatterjee Palash. Identity-Based Encryption. Springer, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Martin. Introduction to Identity-Based Encryption. Artech House Publishers, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Identity-based cryptography. IOS Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vahlis, Eugene. Chosen ciphertext security in identity based encryption. 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Conditional Identity Broadcast based Proxy Re-Encryption Technique for Data Encryption in Cloud. ASDF International, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Camenisch, Jan, Kai Rannenberg, and Ahmad Sabouri. Attribute-Based Credentials for Trust: Identity in the Information Society. Springer International Publishing AG, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Camenisch, Jan, Kai Rannenberg, and Ahmad Sabouri. Attribute-based Credentials for Trust: Identity in the Information Society. Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Camenisch, Jan, Kai Rannenberg, and Ahmad Sabouri. Attribute-Based Credentials for Trust: Identity in the Information Society. Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Patil, Harsh Kupwade, and Stephen A. Szygenda. Security for Wireless Sensor Networks Using Identity-Based Cryptography. Auerbach Publishers, Incorporated, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Patil, Harsh Kupwade, and Stephen A. Szygenda. Security for Wireless Sensor Networks Using Identity-Based Cryptography. Auerbach Publishers, Incorporated, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Patil, Harsh Kupwade, and Stephen A. Szygenda. Security for Wireless Sensor Networks Using Identity-Based Cryptography. Auerbach Publishers, Incorporated, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Patil, Harsh Kupwade, and Stephen A. Szygenda. Security for Wireless Sensor Networks Using Identity-Based Cryptography. Auerbach Publishers, Incorporated, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Patil, Harsh Kupwade, and Stephen A. Szygenda. Security for Wireless Sensor Networks Using Identity-Based Cryptography. Auerbach Publishers, Incorporated, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Fischer-Hübner, Simone, Elisabeth de Leeuw, Jimmy C. Tseng, and John Borking. Policies and Research in Identity Management: First IFIP WG 11.6 Working Conference on Policies and Research in Identity Management , RSM ... and Communication Technology ). Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Fischer-Hübner, Simone, Elisabeth de Leeuw, Jimmy C. Tseng, and John Borking. Policies and Research in Identity Management: First IFIP WG 11. 6 Working Conference on Policies and Research in Identity Management , RSM Erasmus University, Rotterdam, the Netherlands, October 11-12 2007. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Mitchell, Chris J., Simone Fischer-Hübner, and Elisabeth de Leeuw. Policies and Research in Identity Management: Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013, Proceedings. Springer, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Fischer-Hübner, Simone, Lothar Fritsch, and Elisabeth de Leeuw. Policies and Research in Identity Management: Second IFIP WG 11. 6 Working Conference, IDMAN 2010, Oslo, Norway, November 18-19, 2010, Proceedings. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Fischer-Hübner, Simone, Lothar Fritsch, and Elisabeth de Leeuw. Policies and Research in Identity Management: Second IFIP WG 11.6 Working Conference, IDMAN 2010, Oslo, Norway, November 18-19, 2010, Proceedings ... and Communication Technology ). Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Kiayias, Aggelos, and Helger Lipmaa. E-Voting and Identity: Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-20, 2011, Revised Selected Papers. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Martin, Keith M. Public-Key Encryption. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0005.

Full text
Abstract:
In this chapter, we introduce public-key encryption. We first consider the motivation behind the concept of public-key cryptography and introduce the hard problems on which popular public-key encryption schemes are based. We then discuss two of the best-known public-key cryptosystems, RSA and ElGamal. For each of these public-key cryptosystems, we discuss how to set up key pairs and perform basic encryption and decryption. We also identify the basis for security for each of these cryptosystems. We then compare RSA, ElGamal, and elliptic-curve variants of ElGamal from the perspectives of performance and security. Finally, we look at how public-key encryption is used in practice, focusing on the popular use of hybrid encryption.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!