Sciweavers

2108 search results - page 127 / 422
» Encrypted
Sort
View
ESORICS
2007
Springer
15 years 9 months ago
Generalized Key Delegation for Hierarchical Identity-Based Encryption
Michel Abdalla, Eike Kiltz, Gregory Neven
101
Voted
IMA
2007
Springer
89views Cryptology» more  IMA 2007»
15 years 9 months ago
Cryptanalysis of the EPBC Authenticated Encryption Mode
Chris J. Mitchell
93
Voted
IWSEC
2007
Springer
15 years 9 months ago
Generic Certificateless Encryption in the Standard Model
Qiong Huang, Duncan S. Wong
136
Voted
AINA
2005
IEEE
15 years 9 months ago
An Efficient Hierarchical Key Management Scheme Using Symmetric Encryptions
The concept of hierarchical access control is that a higher privileged user (or higher level) has the ability to access data in lower privileged user (or lower level). Hierarchica...
Chu-Hsing Lin, Wei Lee, Yi-Kang Ho