Academic literature on the topic 'Identity Key'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Identity Key.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Identity Key"
Rao, B. V. S. Manikya, and Y. Triveni. "An Identity-Based Mutual Authentication with Key Agreement." International Journal of Trend in Scientific Research and Development Volume-3, Issue-2 (2019): 968–71. http://dx.doi.org/10.31142/ijtsrd21562.
Full textChen, Jianhong, Kefei Chen, Yongtao Wang, Xiangxue Li, Yu Long, and Zhongmei Wan. "Identity-Based Key-Insulated Signcryption." Informatica 23, no. 1 (2012): 27–45. http://dx.doi.org/10.15388/informatica.2012.347.
Full textFiľakovský, Ján, and Vladimír Baar. "Kľúčové elementy bieloruskej národnej identity." Kulturní studia 2018, no. 2 (2018): 3–35. http://dx.doi.org/10.7160/ks.2018.110201.
Full textHwang, T., and J. L. Chen. "Identity-based conference key broadcast systems." IEE Proceedings - Computers and Digital Techniques 141, no. 1 (1994): 57. http://dx.doi.org/10.1049/ip-cdt:19949890.
Full textKoyama, K. "Identity-based conference key distribution system." Electronics Letters 23, no. 10 (1987): 495–96. http://dx.doi.org/10.1049/el:19870359.
Full textYa-juan, Zhang, Zhu Yue-fei, and Huang Qiu-sheng. "An identity-based key-exchange protocol." Wuhan University Journal of Natural Sciences 10, no. 1 (2005): 235–38. http://dx.doi.org/10.1007/bf02828658.
Full textFan, Chun-I., Yi-Hui Lin, Tuan-Hung Hsu, and Ruei-Hau Hsu. "Interdomain Identity-Based Key Agreement Schemes." Mathematical Problems in Engineering 2014 (2014): 1–18. http://dx.doi.org/10.1155/2014/865367.
Full textWan, Zhongmei, Xuejia Lai, Jian Weng, Shengli Liu, and Xuan Hong. "Identity-based key-insulated proxy signature." Journal of Electronics (China) 26, no. 6 (2009): 853–58. http://dx.doi.org/10.1007/s11767-008-0128-2.
Full textKenji and Kazuo. "Identity-based conference key distribution systems." Systems and Computers in Japan 21, no. 1 (1990): 60–67. http://dx.doi.org/10.1002/scj.4690210106.
Full textLiu, Peng Tao. "Secure Symmetric Key Fuzzy Identity-Based Encryption." Applied Mechanics and Materials 321-324 (June 2013): 2665–68. http://dx.doi.org/10.4028/www.scientific.net/amm.321-324.2665.
Full textDissertations / Theses on the topic "Identity Key"
Vargas, Gabriel, Sergio Silva, Ugwu Keliche, and Charles Maina. "Corporate Identity : Communication as a key component." Thesis, Jönköping University, Jönköping International Business School, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-1327.
Full textSchoeman, Madeleine. "Identity formation : a key to transforming teaching and learning." Thesis, Stellenbosch : Stellenbosch University, 2014. http://hdl.handle.net/10019.1/86624.
Full textKelechi, Ugwu, Charles Maina, Sergio Silva, and Gabriel Vargas. "Corporate Identity:Communication as a key Component." Thesis, Jönköping University, Jönköping International Business School, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-1329.
Full textSedlacek, Sabine, Bernhard Kurka, and Gunther Maier. "Regional identity: a key to overcome structural weaknesses in peripheral rural regions?" De Gruyter, 2009. http://dx.doi.org/10.2478/v10091-009-0015-3.
Full textHoad, J. Bridget. "Towards an understanding of procrastinating behaviours in a Key Stage 1 classroom." Thesis, Open University, 2000. http://oro.open.ac.uk/18812/.
Full textOlovsson, Clara, and Djannet Berendji. "Umeå. Wants more. : A coordination perspective on how key stakeholders develop placebrand identity." Thesis, Umeå universitet, Handelshögskolan vid Umeå universitet, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-57848.
Full textGilligan, Chris. "Identity as a key concept for understanding the peace process in Northern Ireland." Thesis, University of Salford, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.248909.
Full textGeis, Amy Lynn. "“The Key to All Reform”: Mormon Women, Religious Identity, and Suffrage, 1887-1920." University of Toledo / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1430420424.
Full textQiu, Lingling, and doublelingqiu@hotmail com. "Landscape as Caricature?" RMIT University. Architecture and Design, 2007. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20080725.120217.
Full textFerreira, Christelle. "Third skin urban identity fashion nexus /." Diss., Pretoria : [s.n.], 2004. http://upetd.up.ac.za/thesis/available/etd-02072005-140927.
Full textBooks on the topic "Identity Key"
E, Marcia J., and Parris Kristen Diane 1955-, eds. The power of identity: Politics in a new key. Chatham House Publishers, 1997.
Find full textPolk, Tim. Cryptographic algorithms and key sizes for Personal Identity Verification. U.S. Dept. of Commerce, National Institute of Standards and Technology, 2010.
Find full textPolk, Tim. Cryptographic algorithms and key sizes for Personal Identity Verification. U.S. Dept. of Commerce, National Institute of Standards and Technology, 2009.
Find full text1969-, Sarkar Palash, and SpringerLink (Online service), eds. Identity-Based Encryption. Springer Science+Business Media, LLC, 2011.
Find full textKim, Saskia. Consumer privacy and identity theft: A summary of key statutes. California State Senate, Senate Office of Research, 2006.
Find full textNational Institute of Standards and Technology (U.S.), ed. Maintaining and using key history on personal identity verification (PIV) cards. U.S. Dept. of Commerce, National Institute of Standards and Technology, 2010.
Find full textCanada. Office of the Commisioner of Official Languages. French on the internet: Key to the Canadian identity and the knowledge economy. Office of the Commissioner of Official Languages, 2002.
Find full textKim, Saskia. Consumer privacy and identity theft: A summary of key statutes and guide for lawmakers. 2nd ed. California Senate Office of Research, 2007.
Find full textBook chapters on the topic "Identity Key"
Haber, Morey J., and Darran Rolls. "Key Takeaways." In Identity Attack Vectors. Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0233-1_22.
Full textChatterjee, Sanjit, and Palash Sarkar. "Avoiding Key Escrow." In Identity-Based Encryption. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-9383-0_11.
Full textPurvi Ramanuj and J. S. Shah. "Identity-Based Key Management." In Proceedings of the International Congress on Information and Communication Technology. Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-0767-5_22.
Full textBoyd, Colin, Anish Mathuria, and Douglas Stebila. "Identity-Based Key Agreement." In Protocols for Authentication and Key Establishment. Springer Berlin Heidelberg, 2019. http://dx.doi.org/10.1007/978-3-662-58146-9_7.
Full textLian, Huanhuan, Tianyu Pan, Huige Wang, and Yunlei Zhao. "Identity-Based Identity-Concealed Authenticated Key Exchange." In Computer Security – ESORICS 2021. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-88428-4_32.
Full textChen, Liqun, and John Malone-Lee. "Improved Identity-Based Signcryption." In Public Key Cryptography - PKC 2005. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-30580-4_25.
Full textBaek, Joonsang, and Yuliang Zheng. "Identity-Based Threshold Decryption." In Public Key Cryptography – PKC 2004. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24632-9_19.
Full textGentry, Craig, and Zulfikar Ramzan. "Identity-Based Aggregate Signatures." In Public Key Cryptography - PKC 2006. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11745853_17.
Full textAbdalla, Michel, Alexander W. Dent, John Malone-Lee, Gregory Neven, Duong Hieu Phan, and Nigel P. Smart. "Identity-Based Traitor Tracing." In Public Key Cryptography – PKC 2007. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-71677-8_24.
Full textChow, Sherman S. M. "Identity-Based Strong Multi-Designated Verifiers Signatures." In Public Key Infrastructure. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11774716_23.
Full textConference papers on the topic "Identity Key"
Gupta, Swati, and Vipul Gupta. "Revocable key identity based cryptography without key Escrow problem." In 2016 International Conference on Computing, Communication and Automation (ICCCA). IEEE, 2016. http://dx.doi.org/10.1109/ccaa.2016.7813817.
Full textLi Xiaoyong and Zhang Hui. "Identity-based authenticated key exchange protocols." In 2010 International Conference on Educational and Information Technology (ICEIT). IEEE, 2010. http://dx.doi.org/10.1109/iceit.2010.5608417.
Full textMisbahuddin, Mohammed, Rashmi Harish, and K. Ananya. "Identity of Things (IDoT): A Preliminary Report on Identity Management Solutions for IoT Devices." In 2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA). IEEE, 2022. http://dx.doi.org/10.1109/pkia56009.2022.9952312.
Full textTu, Yinzi, Jie Gan, Yi Hu, Rui Jin, Zhen Yang, and Meng Liu. "Decentralized identity authentication and key management scheme." In 2019 IEEE 3rd Conference on Energy Internet and Energy System Integration (EI2). IEEE, 2019. http://dx.doi.org/10.1109/ei247390.2019.9062013.
Full textShen, Sung-Shiou, Cen-Fang Jian, Shen-Ho Lin, and Wei Chien. "Travel Shop Service System with Identity Key." In 2020 IEEE Eurasia Conference on IOT, Communication and Engineering (ECICE). IEEE, 2020. http://dx.doi.org/10.1109/ecice50847.2020.9301930.
Full textGeetha Priya., M., and V. Kavitha. "Securing Cloud Identity Information Under Key Introduction." In 2023 International Conference on Computer Communication and Informatics (ICCCI). IEEE, 2023. http://dx.doi.org/10.1109/iccci56745.2023.10128194.
Full textNguyen, Van-Quang-Huy, and Dinh-Hy Ngo. "Private Identity-Based Encryption For Key Management." In 2020 7th NAFOSTED Conference on Information and Computer Science (NICS). IEEE, 2020. http://dx.doi.org/10.1109/nics51282.2020.9335831.
Full textGuan, Zhi, Huiping Sun, Zhong Chen, and Xianghao Nan. "Efficient Identity-Based Key Issue with TPM." In 2008 9th International Conference for Young Computer Scientists (ICYCS). IEEE, 2008. http://dx.doi.org/10.1109/icycs.2008.523.
Full textZhao, Yunlei. "Identity-Concealed Authenticated Encryption and Key Exchange." In CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016. http://dx.doi.org/10.1145/2976749.2978350.
Full textBo, Wu Shao, and Li Cheng Shu. "Identity-based SIP Authentication and Key Agreement." In 2011 Seventh International Conference on Computational Intelligence and Security (CIS). IEEE, 2011. http://dx.doi.org/10.1109/cis.2011.183.
Full textReports on the topic "Identity Key"
Cakulev, V., G. Sundaram, and I. Broustis. IBAKE: Identity-Based Authenticated Key Exchange. RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6539.
Full textKim, Sooyeon, and Jinsook Hwang. Key Components of Luxury Fashion Brand Identity. Iowa State University, Digital Repository, 2016. http://dx.doi.org/10.31274/itaa_proceedings-180814-1704.
Full textPolk, W. T., D. F. Dodson, and W. E. Burr. Cryptographic algorithms and key sizes for personal identity verification. National Institute of Standards and Technology, 2005. http://dx.doi.org/10.6028/nist.sp.800-78.
Full textPolk, W. T., D. F. Dodson, and W. E. Burr. Cryptographic algorithms and key sizes for personal identity verification. National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.800-78-1.
Full textPolk, W. T., D. F. Dodson, and W. E. Burr. Cryptographic algorithms and key sizes for personal identity verification. National Institute of Standards and Technology, 2010. http://dx.doi.org/10.6028/nist.sp.800-78-2.
Full textPolk, W. T., D. F. Dodson, W. E. Burr, H. Ferraiolo, and D. A. Cooper. Cryptographic algorithms and key sizes for personal identity verification. National Institute of Standards and Technology, 2010. http://dx.doi.org/10.6028/nist.sp.800-78-3.
Full textPolk, William T., Donna F. Dodson, William Burr, Salvatore Francomacaro, and David A. Cooper. Cryptographic Algorithms and Key Sizes for Personal Identity Verification. National Institute of Standards and Technology, 2015. http://dx.doi.org/10.6028/nist.sp.800-78-4.
Full textFerraiolo, Hildegard. Cryptographic Algorithms and Key Sizes for Personal Identity Verification. National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.sp.800-78-5.ipd.
Full textFerraiolo, Hildegard. Cryptographic Algorithms and Key Sizes for Personal Identity Verification. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.sp.800-78-5.
Full textCooper, David A. Maintaining and using key history on personal identity verification (PIV) cards. National Institute of Standards and Technology, 2010. http://dx.doi.org/10.6028/nist.ir.7676.
Full text