Sciweavers

32 search results - page 7 / 7
» Secure Delegation of Elliptic-Curve Pairing
Sort
View
IEEECIT
2005
IEEE
14 years 20 days ago
Identity Based Threshold Proxy Signcryption Scheme
An identity based cryptosystem is a novel type of public cryptographic scheme in which the public keys of the users are their identities or strings derived from their identities. ...
Meng Wang, Zhijing Liu
ESORICS
2006
Springer
13 years 10 months ago
Reducing the Dependence of SPKI/SDSI on PKI
Abstract. Trust-management systems address the authorization problem in distributed systems. They offer several advantages over other approaches, such as support for delegation and...
Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwo...