Zobrazeno 1 - 4
of 4
pro vyhledávání: '"Carla Rífols"'
Publikováno v:
Journal of Systems and Software. 81:1218-1226
Certificate-based encryption has been recently proposed as a means to simplify the certificate management inherent to traditional public key encryption. In this paper, we present an efficient certificate-based encryption scheme which is fully secure
Publikováno v:
Recercat. Dipósit de la Recerca de Catalunya
instname
Advances in Cryptology--ASIACRYPT 2015 ISBN: 9783662487969
ASIACRYPT (1)
instname
Advances in Cryptology--ASIACRYPT 2015 ISBN: 9783662487969
ASIACRYPT (1)
A sequence of recent works have constructed constant-size quasi-adaptive QA NIZK arguments of membership in linear subspaces of $$\hat{\mathbb {G}}^m$$, where $$\hat{\mathbb {G}}$$ is a group equipped with a bilinear map $$e:\hat{\mathbb {G}} \times
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ea415b693622467afa882d8ef34fd0d2
http://hdl.handle.net/10230/42226
http://hdl.handle.net/10230/42226
Publikováno v:
Recercat. Dipósit de la Recerca de Catalunya
instname
ResearcherID
Public-Key Cryptography – PKC 2014 ISBN: 9783642546303
Public Key Cryptography
instname
ResearcherID
Public-Key Cryptography – PKC 2014 ISBN: 9783642546303
Public Key Cryptography
Comunicació presentada a: PKC 2014 17th International Conference on Practice and Theory in Public-Key Cryptography, celebrada a Buenos Aires, Argentina, del 26 al 28 de març de 2014 Lossy trapdoor functions, introduced by Peikert and Waters (STOC
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e7886d976165561170984253f63f94ba
http://hdl.handle.net/10230/42228
http://hdl.handle.net/10230/42228
Publikováno v:
Digital.CSIC. Repositorio Institucional del CSIC
instname
instname
13 pages.-- Printed version published on Dec 19, 2007.
In this paper, we propose some cryptographic techniques to securely set up a mobile ad-hoc network. The process is fully self-managed by the nodes, without any trusted party. New nodes can j
In this paper, we propose some cryptographic techniques to securely set up a mobile ad-hoc network. The process is fully self-managed by the nodes, without any trusted party. New nodes can j
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c5648636bbbebc46fc4fde37de0bfd35
http://hdl.handle.net/10261/9877
http://hdl.handle.net/10261/9877