Academic literature on the topic 'Identity Key'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Identity Key.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Identity Key"

1

Rao, B. V. S. Manikya, and Y. Triveni. "An Identity-Based Mutual Authentication with Key Agreement." International Journal of Trend in Scientific Research and Development Volume-3, Issue-2 (2019): 968–71. http://dx.doi.org/10.31142/ijtsrd21562.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chen, Jianhong, Kefei Chen, Yongtao Wang, Xiangxue Li, Yu Long, and Zhongmei Wan. "Identity-Based Key-Insulated Signcryption." Informatica 23, no. 1 (2012): 27–45. http://dx.doi.org/10.15388/informatica.2012.347.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fiľakovský, Ján, and Vladimír Baar. "Kľúčové elementy bieloruskej národnej identity." Kulturní studia 2018, no. 2 (2018): 3–35. http://dx.doi.org/10.7160/ks.2018.110201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hwang, T., and J. L. Chen. "Identity-based conference key broadcast systems." IEE Proceedings - Computers and Digital Techniques 141, no. 1 (1994): 57. http://dx.doi.org/10.1049/ip-cdt:19949890.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Koyama, K. "Identity-based conference key distribution system." Electronics Letters 23, no. 10 (1987): 495–96. http://dx.doi.org/10.1049/el:19870359.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ya-juan, Zhang, Zhu Yue-fei, and Huang Qiu-sheng. "An identity-based key-exchange protocol." Wuhan University Journal of Natural Sciences 10, no. 1 (2005): 235–38. http://dx.doi.org/10.1007/bf02828658.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Fan, Chun-I., Yi-Hui Lin, Tuan-Hung Hsu, and Ruei-Hau Hsu. "Interdomain Identity-Based Key Agreement Schemes." Mathematical Problems in Engineering 2014 (2014): 1–18. http://dx.doi.org/10.1155/2014/865367.

Full text
Abstract:
In order to simplify key management, two-party and three-party key agreement schemes based on user identities have been proposed recently. Multiparty (including more than three parties) key agreement protocols, which also are called conference key schemes, can be applied to distributed systems and wireless environments, such as ad hoc networks, for the purpose of multiparty secure communication. However, it is hard to extend two- or three-party schemes to multiparty ones with the guarantee of efficiency and security. In addition to the above two properties, interdomain environments should also
APA, Harvard, Vancouver, ISO, and other styles
8

Wan, Zhongmei, Xuejia Lai, Jian Weng, Shengli Liu, and Xuan Hong. "Identity-based key-insulated proxy signature." Journal of Electronics (China) 26, no. 6 (2009): 853–58. http://dx.doi.org/10.1007/s11767-008-0128-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kenji and Kazuo. "Identity-based conference key distribution systems." Systems and Computers in Japan 21, no. 1 (1990): 60–67. http://dx.doi.org/10.1002/scj.4690210106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Liu, Peng Tao. "Secure Symmetric Key Fuzzy Identity-Based Encryption." Applied Mechanics and Materials 321-324 (June 2013): 2665–68. http://dx.doi.org/10.4028/www.scientific.net/amm.321-324.2665.

Full text
Abstract:
Symmetric key fuzzy Identity-Based Encryption (IBE) is a special type of IBE in secret key model. In this paper we extend the notion to the case of fuzzy Identity-Based Encryption, and give a formal definition of symmetric key fuzzy IBE and its security requirements. Moreover, we propose a construction of symmetric key fuzzy IBE based on the public key fuzzy IBE of Sahai and Waters, and prove its security.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Identity Key"

1

Vargas, Gabriel, Sergio Silva, Ugwu Keliche, and Charles Maina. "Corporate Identity : Communication as a key component." Thesis, Jönköping University, Jönköping International Business School, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-1327.

Full text
Abstract:
<p>Problem: In the world of today’s business, there is a trend for investors not only to base their decisions whether to invest in a company on the basis of its financial results. These days more features are taken into consideration. Corporate identity is a crucial aspect to bear in mind for investors, as it demonstrates what the company is, how it works and where it is going. Corporate Communication is a process that allows companies to share their information with the stakeholders. Not every company is aware of the significance of communicating its corporate identity to investors. These rep
APA, Harvard, Vancouver, ISO, and other styles
2

Schoeman, Madeleine. "Identity formation : a key to transforming teaching and learning." Thesis, Stellenbosch : Stellenbosch University, 2014. http://hdl.handle.net/10019.1/86624.

Full text
Abstract:
Thesis (MPhil)--Stellenbosch University, 2014.<br>ENGLISH ABSTRACT: This paper proposes a possible solution to the current state of education in South African public schools, notably the underperforming schools. It uses various international studies, namely the Progress in International Reading Literacy Study (PIRLS), the 2003 Third International Maths and Science Study (TIMMS), the Southern and Eastern African Consortium for Monitoring Education Quality (SACMEQ), as well as the matriculation results to explore the reality of the education crisis as a poverty trap. I then explore possible
APA, Harvard, Vancouver, ISO, and other styles
3

Kelechi, Ugwu, Charles Maina, Sergio Silva, and Gabriel Vargas. "Corporate Identity:Communication as a key Component." Thesis, Jönköping University, Jönköping International Business School, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-1329.

Full text
Abstract:
<p>Problem: In the world of today’s business, there is a trend for investors not only to base their decisions whether to invest in a company on the basis of its financial results.</p><p>These days more features are taken into consideration. Corporate identity is a crucial aspect to bear in mind for investors, as it demonstrates what the company is, how it works and where it is going. Corporate Communication is a process that allows companies to share their information with the stakeholders. Not every company is aware</p><p>of the significance of communicating its corporate identity to investor
APA, Harvard, Vancouver, ISO, and other styles
4

Sedlacek, Sabine, Bernhard Kurka, and Gunther Maier. "Regional identity: a key to overcome structural weaknesses in peripheral rural regions?" De Gruyter, 2009. http://dx.doi.org/10.2478/v10091-009-0015-3.

Full text
Abstract:
Depopulation is a well-known phenomenon in peripheral rural regions. The most identified problems are based on structural weaknesses in terms of decreasing business activities and a lack of public infrastructure. In such regions population is mainly older causing major changes in social infrastructure. For instance many schools and kindergartens close down for lack of demand, which hinders young families to migrate to such regions. The result is typically a negative cumulative process of loss of population, loss of jobs, loss of infrastructure, further outmigration. It is an enormous challenge
APA, Harvard, Vancouver, ISO, and other styles
5

Hoad, J. Bridget. "Towards an understanding of procrastinating behaviours in a Key Stage 1 classroom." Thesis, Open University, 2000. http://oro.open.ac.uk/18812/.

Full text
Abstract:
This study sets out to understand repeated procrastinating behaviours which may become detrimental to effective teaching, learning and assessment. The five case studies were conducted in a local authority primary school over a period of two years when the children were in Key Stage 1, aged five, six and seven years. The focus of this study was the possible detrimental effects of procrastinating behaviours in curriculum learning, through assigned tasks. Behaviours were observed and interviews conducted to reach a understanding of the tasks from the child’s perspective. The teacher’s perspective
APA, Harvard, Vancouver, ISO, and other styles
6

Olovsson, Clara, and Djannet Berendji. "Umeå. Wants more. : A coordination perspective on how key stakeholders develop placebrand identity." Thesis, Umeå universitet, Handelshögskolan vid Umeå universitet, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-57848.

Full text
Abstract:
During centuries, places – nations, region and cities – have tried to make themselvesmore attractive, productive, lucrative and secure. This strive has accelerated due toglobalization and other external factors. Today there is fierce and global competitionbetween cities regarding promoting exports, convincing firms to invest as well asattracting tourists and inhabitants. The place brand, and the meaning of it, is key forsuccess. However, place branding is challenging. It includes the involvement of allstakeholders – possessing different agendas and target markets – and the coordination ofthose
APA, Harvard, Vancouver, ISO, and other styles
7

Gilligan, Chris. "Identity as a key concept for understanding the peace process in Northern Ireland." Thesis, University of Salford, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.248909.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Geis, Amy Lynn. "“The Key to All Reform”: Mormon Women, Religious Identity, and Suffrage, 1887-1920." University of Toledo / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1430420424.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Qiu, Lingling, and doublelingqiu@hotmail com. "Landscape as Caricature?" RMIT University. Architecture and Design, 2007. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20080725.120217.

Full text
Abstract:
Can Landscape be created like a caricature? How can the key characteristics of a site be celebrated in different ways through design? Can potential design possibilities be generated through celebrating the key characteristics of a site's contexts? My research started with the idea of 'Identity', as the existing Central Plaza copies the physical form of an adjacent park (People's Park) in a simplistic way without considering its own unique key contexts, and I think every location and context is different. Careful consideration of both physical and cultural contexts is what a landscape arch
APA, Harvard, Vancouver, ISO, and other styles
10

Ferreira, Christelle. "Third skin urban identity fashion nexus /." Diss., Pretoria : [s.n.], 2004. http://upetd.up.ac.za/thesis/available/etd-02072005-140927.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Identity Key"

1

Postmes, T. Rediscovering social identity: Key readings. Psychology Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Blacklock, Oliver. Corporate identity is the key to success. LCP, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

E, Marcia J., and Parris Kristen Diane 1955-, eds. The power of identity: Politics in a new key. Chatham House Publishers, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Polk, Tim. Cryptographic algorithms and key sizes for Personal Identity Verification. U.S. Dept. of Commerce, National Institute of Standards and Technology, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Polk, Tim. Cryptographic algorithms and key sizes for Personal Identity Verification. U.S. Dept. of Commerce, National Institute of Standards and Technology, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

1969-, Sarkar Palash, and SpringerLink (Online service), eds. Identity-Based Encryption. Springer Science+Business Media, LLC, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kim, Saskia. Consumer privacy and identity theft: A summary of key statutes. California State Senate, Senate Office of Research, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

National Institute of Standards and Technology (U.S.), ed. Maintaining and using key history on personal identity verification (PIV) cards. U.S. Dept. of Commerce, National Institute of Standards and Technology, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Canada. Office of the Commisioner of Official Languages. French on the internet: Key to the Canadian identity and the knowledge economy. Office of the Commissioner of Official Languages, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kim, Saskia. Consumer privacy and identity theft: A summary of key statutes and guide for lawmakers. 2nd ed. California Senate Office of Research, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Identity Key"

1

Haber, Morey J., and Darran Rolls. "Key Takeaways." In Identity Attack Vectors. Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0233-1_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chatterjee, Sanjit, and Palash Sarkar. "Avoiding Key Escrow." In Identity-Based Encryption. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-9383-0_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Purvi Ramanuj and J. S. Shah. "Identity-Based Key Management." In Proceedings of the International Congress on Information and Communication Technology. Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-0767-5_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Boyd, Colin, Anish Mathuria, and Douglas Stebila. "Identity-Based Key Agreement." In Protocols for Authentication and Key Establishment. Springer Berlin Heidelberg, 2019. http://dx.doi.org/10.1007/978-3-662-58146-9_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lian, Huanhuan, Tianyu Pan, Huige Wang, and Yunlei Zhao. "Identity-Based Identity-Concealed Authenticated Key Exchange." In Computer Security – ESORICS 2021. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-88428-4_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Liqun, and John Malone-Lee. "Improved Identity-Based Signcryption." In Public Key Cryptography - PKC 2005. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-30580-4_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Baek, Joonsang, and Yuliang Zheng. "Identity-Based Threshold Decryption." In Public Key Cryptography – PKC 2004. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24632-9_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gentry, Craig, and Zulfikar Ramzan. "Identity-Based Aggregate Signatures." In Public Key Cryptography - PKC 2006. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11745853_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Abdalla, Michel, Alexander W. Dent, John Malone-Lee, Gregory Neven, Duong Hieu Phan, and Nigel P. Smart. "Identity-Based Traitor Tracing." In Public Key Cryptography – PKC 2007. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-71677-8_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chow, Sherman S. M. "Identity-Based Strong Multi-Designated Verifiers Signatures." In Public Key Infrastructure. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11774716_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Identity Key"

1

Gupta, Swati, and Vipul Gupta. "Revocable key identity based cryptography without key Escrow problem." In 2016 International Conference on Computing, Communication and Automation (ICCCA). IEEE, 2016. http://dx.doi.org/10.1109/ccaa.2016.7813817.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Li Xiaoyong and Zhang Hui. "Identity-based authenticated key exchange protocols." In 2010 International Conference on Educational and Information Technology (ICEIT). IEEE, 2010. http://dx.doi.org/10.1109/iceit.2010.5608417.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Misbahuddin, Mohammed, Rashmi Harish, and K. Ananya. "Identity of Things (IDoT): A Preliminary Report on Identity Management Solutions for IoT Devices." In 2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA). IEEE, 2022. http://dx.doi.org/10.1109/pkia56009.2022.9952312.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tu, Yinzi, Jie Gan, Yi Hu, Rui Jin, Zhen Yang, and Meng Liu. "Decentralized identity authentication and key management scheme." In 2019 IEEE 3rd Conference on Energy Internet and Energy System Integration (EI2). IEEE, 2019. http://dx.doi.org/10.1109/ei247390.2019.9062013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shen, Sung-Shiou, Cen-Fang Jian, Shen-Ho Lin, and Wei Chien. "Travel Shop Service System with Identity Key." In 2020 IEEE Eurasia Conference on IOT, Communication and Engineering (ECICE). IEEE, 2020. http://dx.doi.org/10.1109/ecice50847.2020.9301930.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Geetha Priya., M., and V. Kavitha. "Securing Cloud Identity Information Under Key Introduction." In 2023 International Conference on Computer Communication and Informatics (ICCCI). IEEE, 2023. http://dx.doi.org/10.1109/iccci56745.2023.10128194.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nguyen, Van-Quang-Huy, and Dinh-Hy Ngo. "Private Identity-Based Encryption For Key Management." In 2020 7th NAFOSTED Conference on Information and Computer Science (NICS). IEEE, 2020. http://dx.doi.org/10.1109/nics51282.2020.9335831.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Guan, Zhi, Huiping Sun, Zhong Chen, and Xianghao Nan. "Efficient Identity-Based Key Issue with TPM." In 2008 9th International Conference for Young Computer Scientists (ICYCS). IEEE, 2008. http://dx.doi.org/10.1109/icycs.2008.523.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhao, Yunlei. "Identity-Concealed Authenticated Encryption and Key Exchange." In CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016. http://dx.doi.org/10.1145/2976749.2978350.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bo, Wu Shao, and Li Cheng Shu. "Identity-based SIP Authentication and Key Agreement." In 2011 Seventh International Conference on Computational Intelligence and Security (CIS). IEEE, 2011. http://dx.doi.org/10.1109/cis.2011.183.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Identity Key"

1

Cakulev, V., G. Sundaram, and I. Broustis. IBAKE: Identity-Based Authenticated Key Exchange. RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6539.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kim, Sooyeon, and Jinsook Hwang. Key Components of Luxury Fashion Brand Identity. Iowa State University, Digital Repository, 2016. http://dx.doi.org/10.31274/itaa_proceedings-180814-1704.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Polk, W. T., D. F. Dodson, and W. E. Burr. Cryptographic algorithms and key sizes for personal identity verification. National Institute of Standards and Technology, 2005. http://dx.doi.org/10.6028/nist.sp.800-78.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Polk, W. T., D. F. Dodson, and W. E. Burr. Cryptographic algorithms and key sizes for personal identity verification. National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.800-78-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Polk, W. T., D. F. Dodson, and W. E. Burr. Cryptographic algorithms and key sizes for personal identity verification. National Institute of Standards and Technology, 2010. http://dx.doi.org/10.6028/nist.sp.800-78-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Polk, W. T., D. F. Dodson, W. E. Burr, H. Ferraiolo, and D. A. Cooper. Cryptographic algorithms and key sizes for personal identity verification. National Institute of Standards and Technology, 2010. http://dx.doi.org/10.6028/nist.sp.800-78-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Polk, William T., Donna F. Dodson, William Burr, Salvatore Francomacaro, and David A. Cooper. Cryptographic Algorithms and Key Sizes for Personal Identity Verification. National Institute of Standards and Technology, 2015. http://dx.doi.org/10.6028/nist.sp.800-78-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ferraiolo, Hildegard. Cryptographic Algorithms and Key Sizes for Personal Identity Verification. National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.sp.800-78-5.ipd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ferraiolo, Hildegard. Cryptographic Algorithms and Key Sizes for Personal Identity Verification. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.sp.800-78-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cooper, David A. Maintaining and using key history on personal identity verification (PIV) cards. National Institute of Standards and Technology, 2010. http://dx.doi.org/10.6028/nist.ir.7676.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!