Sciweavers

317 search results - page 16 / 64
» Certificateless Public Key Cryptography
Sort
View
MDAI
2007
Springer
14 years 4 months ago
A Public-Key Protocol for Social Networks with Private Relationships
Abstract. The need for protecting the privacy of relationships in social networks has recently been stressed in the literature. Conventional protection mechanisms in those networks...
Josep Domingo-Ferrer
ICDCS
2008
IEEE
14 years 4 months ago
WebIBC: Identity Based Cryptography for Client Side Security in Web Applications
The growing popularity of web applications in the last few years has led users to give the management of their data to online application providers, which will endanger the securi...
Zhi Guan, Zhen Cao, Xuan Zhao, Ruichuan Chen, Zhon...
SIGUCCS
1999
ACM
14 years 2 months ago
Who's Got the Key?
This paper attempts to illuminate several fundamental concepts used in the creation of a Public Key Infrastructure (PKI). These concepts include encryption, public key cryptograph...
David Henry
AINA
2009
IEEE
14 years 2 months ago
Identity-Based Cryptography for Securing Mobile Phone Calls
In this paper, an identity-based key agreement system for mobile telephony in GSM and UMTS networks is presented. The use of telephone numbers as public keys allows the system to ...
Matthew Smith, Christian Schridde, Björn Agel...
COCOON
2010
Springer
14 years 2 months ago
Identity-Based Authenticated Asymmetric Group Key Agreement Protocol
In identity-based public-key cryptography, an entity’s public key can be easily derived from its identity. The direct derivation of public keys in identity-based public-key crypt...
Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferr...