Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography
暂无分享,去创建一个
[1] Joonsang Baek,et al. A Survey of Identity-Based Cryptography , 2004 .
[2] Stephen Gilmore,et al. Evaluating the Performance of Skeleton-Based High Level Parallel Programs , 2004, International Conference on Computational Science.
[3] Ben Lynn,et al. Toward Hierarchical Identity-Based Encryption , 2002, EUROCRYPT.
[4] Aggelos Kiayias,et al. Traitor Tracing with Constant Transmission Rate , 2002, EUROCRYPT.
[5] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[6] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[7] Clifford C. Cocks. An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.
[8] Kenneth G. Paterson,et al. What can identity-based cryptography offer to web services? , 2007, SWS '07.
[9] Matthew J. B. Robshaw,et al. On Identity-Based Cryptography and Grid Computing , 2004, International Conference on Computational Science.
[10] Yuliang Zheng,et al. Advances in Cryptology — ASIACRYPT 2002 , 2002, Lecture Notes in Computer Science.
[11] Craig Gentry,et al. Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.
[12] Wenbo Mao,et al. An Identity-based Non-interactive Authentication Framework for Computational Grids , 2004 .
[13] Kenneth G. Paterson,et al. Identity-based cryptography for grid security , 2005, First International Conference on e-Science and Grid Computing (e-Science'05).
[14] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[15] Donald E. Eastlake,et al. XML-Signature Syntax and Processing , 2001, RFC.