Publicly posted composite documents with identity based encryption
暂无分享,去创建一个
[1] Clifford C. Cocks. An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.
[2] William Stallings,et al. THE ADVANCED ENCRYPTION STANDARD , 2002, Cryptologia.
[3] Marco Casassa Mont,et al. A flexible role-based secure messaging service: exploiting IBE technology for privacy in health care , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..
[4] Tanja Lange,et al. Pairing-Based Cryptography , 2005, Handbook of Elliptic and Hyperelliptic Curve Cryptography.
[5] T. Grance,et al. SP 800-122. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) , 2010 .
[6] X Itu,et al. Information technology-open systems interconnection-the directory: Public-key and attribute certific , 2000 .
[7] Marco Casassa Mont,et al. A Flexible Role -based Secure Messaging Service: Exploiting IBE Technology in a Health Care Trial , 2003 .
[8] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[9] Steven J. Simske,et al. Differential access for publicly-posted composite documents with multiple workflow participants , 2010, DocEng '10.
[10] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[11] Marco Casassa Mont,et al. The HP Time Vault Service: Innovating the Way Confidential Information is Disclosed, at the Right Time , 2002 .