Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,284,315 papers from all fields of science
Search
Sign In
Create Free Account
ID-based cryptography
Known as:
Identity Based Public Key Cryptography
, IDPKC
, Cocks Identity Based Encryption
Expand
Identity-based cryptography is a type of public-key cryptography in which a publicly known string representing an individual or organization is used…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Certificate-based encryption
Certificateless cryptography
ID-based encryption
Identity-based conditional proxy re-encryption
Expand
Broader (1)
Public-key cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
ID Based Cryptography for Cloud Data Storage
N. Kaaniche
,
Aymen Boudguiga
,
M. Laurent
IEEE Sixth International Conference on Cloud…
2013
Corpus ID: 14346129
This paper addresses the security issues of storing sensitive data in a cloud storage service and the need for users to trust the…
Expand
2012
2012
Resilience and security of opportunistic communications for emergency evacuation
Gökçe Görbil
,
E. Gelenbe
International Workshop on Performance Monitoring…
2012
Corpus ID: 14060908
We describe an autonomous emergency support system (ESS) based on opportunistic communications (oppcomms) to support navigation…
Expand
2010
2010
An identity-based authentication and key establishment scheme for multi-operator maintained Wireless Mesh Networks
Bing He
,
D. Agrawal
The 7th IEEE International Conference on Mobile…
2010
Corpus ID: 33195791
Wireless Mesh Networks (WMNs) offer broadband wireless Internet access with flexible and cost-effective deployment. Security is…
Expand
2010
2010
Opportunistic node authentication in intermittently connected mobile ad hoc networks
Yaozhou Ma
,
A. Jamalipour
Asia-Pacific Conference on Communications
2010
Corpus ID: 43853588
Data communication over intermittently connected mobile ad hoc networks (ICMANs) can be carried out by opportunistically…
Expand
Review
2008
Review
2008
Building secure user-to-user messaging in mobile telecommunication networks
Shushan Zhao
,
A. Aggarwal
,
Shuping Liu
Wireless Telecommunications Symposium
2008
Corpus ID: 20078512
Short Message Service (SMS) and Multimedia Message Service (MMS) are popularly used and will be more popular in the future…
Expand
2008
2008
Mobile ad-hoc network key management with certificateless cryptography
Zhenfei Zhang
,
Willy Susilo
,
R. Raad
International Conference on Signal Processing and…
2008
Corpus ID: 2158195
In this paper, we present an idea of adopting certificateless public key encryption (CL-PKE) schemes over mobile ad hoc network…
Expand
2008
2008
Grid authentication from identity-based cryptography without random oracles
Yan Zheng
,
Haiyan Wang
,
Ruchuan Wang
2008
Corpus ID: 62558601
2007
2007
Key Refreshing in Identity-Based Cryptography and its Applications in MANETs
S. Balfe
,
K. D. Boklan
,
Z. Klagsbrun
,
K. Paterson
IEEE Military Communications Conference
2007
Corpus ID: 35152085
This paper introduces a lightweight and secure framework enabling the refreshing of private keys in identity-based public key…
Expand
2007
2007
ZigBee Security Using Identity-Based Cryptography
S. T. Nguyen
,
Chunming Rong
International Conference on Autonomic and Trusted…
2007
Corpus ID: 31384855
ZigBee is a specification defining a set of protocols and architecture for monitoring and control networks. With the advantages…
Expand
2002
2002
Identity-Based Mediated RSA ?
D. Boneh
,
Xuhua Ding
,
G. Tsudik
2002
Corpus ID: 7494788
Identity-based encryption (IBE) [5] and digital signatures are important tools in modern secure communication. In general…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE