An authenticated re-encryption scheme for secure file transfer in named data networks
暂无分享,去创建一个
[1] A. Serhrouchni,et al. Named-Data security scheme for Named Data Networking , 2012, 2012 Third International Conference on The Network of the Future (NOF).
[2] Zhenfu Cao,et al. Multi-Use Unidirectional Proxy Re-Encryption , 2011, 2011 IEEE International Conference on Communications (ICC).
[3] Alfred Menezes,et al. The State of Elliptic Curve Cryptography , 2000, Des. Codes Cryptogr..
[4] Xiaotie Deng,et al. TinyPairing: Computing Tate Pairing on Sensor Nodes with Higher Speed and Less Memory , 2009, 2009 Eighth IEEE International Symposium on Network Computing and Applications.
[5] Xiaotie Deng,et al. TinyPairing: A Fast and Lightweight Pairing-Based Cryptographic Library for Wireless Sensor Networks , 2010, 2010 IEEE Wireless Communication and Networking Conference.
[6] Van Jacobson,et al. Networking named content , 2009, CoNEXT '09.
[7] Matthew Green,et al. Identity-Based Proxy Re-encryption , 2007, ACNS.
[8] Xu An Wang,et al. A New Identity Based Proxy Re-Encryption Scheme , 2010, 2010 International Conference on Biomedical Engineering and Computer Science.
[9] Scott Shenker,et al. A data-oriented (and beyond) network architecture , 2007, SIGCOMM 2007.
[10] Dan Boneh,et al. Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.
[11] Xu An Wang,et al. CCA-secure Identity Based Proxy Re-encryption Based on a Variant of BB1 IBE , 2010, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing.
[12] Tao Jiang,et al. An Improved Authenticated Group Key Transfer Protocol Based on Secret Sharing , 2013, IEEE Transactions on Computers.
[13] Joonsang Baek,et al. Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption , 2005, Public Key Cryptography.
[14] Diana K. Smetters,et al. VoCCN: voice-over content-centric networks , 2009, ReArch '09.
[15] Lixia Zhang,et al. Data naming in Vehicle-to-Vehicle communications , 2012, 2012 Proceedings IEEE INFOCOM Workshops.
[16] Benoît Libert,et al. Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption , 2008, IEEE Transactions on Information Theory.
[17] Alexander Afanasyev,et al. Rapid traffic information dissemination using named data , 2012, NoM '12.
[18] Wen-Guey Tzeng,et al. Identity-Based Proxy Re-encryption Without Random Oracles , 2007, ISC.
[19] Yuguang Fang,et al. Securing Mobile Ad Hoc Networks with Certificateless Public Keys , 2006, IEEE Transactions on Dependable and Secure Computing.
[20] Sihem Mesnager,et al. A Systolic Hardware Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems , 2016, IACR Cryptol. ePrint Arch..
[21] Xiaoming Hu,et al. ID-Based Proxy Re-Encryption Schemes Without Random Oracle , 2009, 2009 International Conference on Computational Intelligence and Security.
[22] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[23] Sihem Mesnager,et al. A Scalable and Systolic Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems Based on DSPs , 2016, SPACE.
[24] Yun Ling,et al. Identity-Based Conditional Proxy Re-Encryption , 2011, 2011 IEEE International Conference on Communications (ICC).
[25] Xu An Wang,et al. Identity Based Proxy Re-encryption Based on a Variant of BB1 Identity Based Encryption , 2010, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing.