top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in elliptic curve cryptography / edited by Ian F. Blake, Gadiel Seroussi, Nigel P. Smart
Advances in elliptic curve cryptography / edited by Ian F. Blake, Gadiel Seroussi, Nigel P. Smart
Pubbl/distr/stampa Cambridge ; New York : Cambridge University Press, 2005
Descrizione fisica xvi, 281 p. : ill. ; 23 cm
Disciplina 005.8
Altri autori (Persone) Blake, Ian F.
Seroussi, G.
Smart, Nigel P.
Collana London Mathematical Society lecture note series, 0076-0552 ; 317
Soggetto topico Computer security
Public key cryptography
ISBN 052160415X
Classificazione AMS 94A60
AMS 11T
LC QA76.9.A25A375
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISALENTO-991001263039707536
Cambridge ; New York : Cambridge University Press, 2005
Materiale a stampa
Lo trovi qui: Univ. del Salento
Opac: Controlla la disponibilità qui
APKC '17 : proceedings of the 4th ACM International Workshop on Asia Public-Key Cryptography : April 2, 2017, Abu Dhabi, UAE / / sponsored by ACM SIGSAC
APKC '17 : proceedings of the 4th ACM International Workshop on Asia Public-Key Cryptography : April 2, 2017, Abu Dhabi, UAE / / sponsored by ACM SIGSAC
Pubbl/distr/stampa New York : , : ACM, , 2017
Descrizione fisica 1 online resource (52 pages)
Disciplina 005.8
Soggetto topico Public key infrastructure (Computer security)
Public key cryptography
Data encryption (Computer science)
Soggetto genere / forma Electronic books.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Asia Public-Key Cryptography 2017 : proceedings of the 4th Association for Computing Machinery International Workshop on Asia Public-Key Cryptography : April 2, 2017, Abu Dhabi, UAE
Proceedings of the 4th ACM International Workshop on ASIA Public-Key Cryptography
Proceedings of the 4th Association for Computing Machinery International Workshop on ASIA Public-Key Cryptography
Record Nr. UNINA-9910375792303321
New York : , : ACM, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Applied public key infrastructure [[electronic resource] ] : 4th International Workshop : IWAP 2005 / / edited by Jianying Zhou ... [et al.]
Applied public key infrastructure [[electronic resource] ] : 4th International Workshop : IWAP 2005 / / edited by Jianying Zhou ... [et al.]
Pubbl/distr/stampa Amsterdam ; ; Washington, DC, : IOS Press, c2005
Descrizione fisica 1 online resource (276 p.)
Disciplina 005.8/2
Altri autori (Persone) ZhouJianying
Collana Frontiers in artificial intelligence and applications
Soggetto topico Public key infrastructure (Computer security)
Public key cryptography
Soggetto genere / forma Electronic books.
ISBN 6610505004
1-280-50500-1
9786610505005
1-4237-9969-0
1-60750-136-8
600-00-0345-5
1-60129-117-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Title page; Preface; Program Committee; Contents; PKI Operation & Case Study; Non-Repudiation; Authorization & Access Control; Authentication & Time-Stamping; Certificate Validation & Revocation; Cryptographic Applications; Author Index
Record Nr. UNINA-9910449822303321
Amsterdam ; ; Washington, DC, : IOS Press, c2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Applied public key infrastructure [[electronic resource] ] : 4th International Workshop : IWAP 2005 / / edited by Jianying Zhou ... [et al.]
Applied public key infrastructure [[electronic resource] ] : 4th International Workshop : IWAP 2005 / / edited by Jianying Zhou ... [et al.]
Pubbl/distr/stampa Amsterdam ; ; Washington, DC, : IOS Press, c2005
Descrizione fisica 1 online resource (276 p.)
Disciplina 005.8/2
Altri autori (Persone) ZhouJianying
Collana Frontiers in artificial intelligence and applications
Soggetto topico Public key infrastructure (Computer security)
Public key cryptography
ISBN 6610505004
1-280-50500-1
9786610505005
1-4237-9969-0
1-60750-136-8
600-00-0345-5
1-60129-117-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Title page; Preface; Program Committee; Contents; PKI Operation & Case Study; Non-Repudiation; Authorization & Access Control; Authentication & Time-Stamping; Certificate Validation & Revocation; Cryptographic Applications; Author Index
Record Nr. UNINA-9910783420803321
Amsterdam ; ; Washington, DC, : IOS Press, c2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Applied public key infrastructure [[electronic resource] ] : 4th International Workshop : IWAP 2005 / / edited by Jianying Zhou ... [et al.]
Applied public key infrastructure [[electronic resource] ] : 4th International Workshop : IWAP 2005 / / edited by Jianying Zhou ... [et al.]
Edizione [1st ed.]
Pubbl/distr/stampa Amsterdam ; ; Washington, DC, : IOS Press, c2005
Descrizione fisica 1 online resource (276 p.)
Disciplina 005.8/2
Altri autori (Persone) ZhouJianying
Collana Frontiers in artificial intelligence and applications
Soggetto topico Public key infrastructure (Computer security)
Public key cryptography
ISBN 6610505004
1-280-50500-1
9786610505005
1-4237-9969-0
1-60750-136-8
600-00-0345-5
1-60129-117-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Title page; Preface; Program Committee; Contents; PKI Operation & Case Study; Non-Repudiation; Authorization & Access Control; Authentication & Time-Stamping; Certificate Validation & Revocation; Cryptographic Applications; Author Index
Record Nr. UNINA-9910821280503321
Amsterdam ; ; Washington, DC, : IOS Press, c2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
AsiaPKC '16 : proceedings of the 3rd ACM International Workshop on Asia Public-Key Cryptography : May 30, 2016, Xi'an, China / / sponsored by ACM SIGSAC
AsiaPKC '16 : proceedings of the 3rd ACM International Workshop on Asia Public-Key Cryptography : May 30, 2016, Xi'an, China / / sponsored by ACM SIGSAC
Pubbl/distr/stampa New York : , : ACM, , 2016
Descrizione fisica 1 online resource (62 pages)
Disciplina 005.8
Soggetto topico Public key infrastructure (Computer security)
Public key cryptography
Data encryption (Computer science)
Soggetto genere / forma Electronic books.
ISBN 1-4503-4286-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Asia Public-Key Cryptography 2016 : proceedings of the 3rd Association for Computing Machinery International Workshop on Asia Public-Key Cryptography : May 30, 2016, Xi'an, China
Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography
Proceedings of the 3rd Association for Computing Machinery International Workshop on ASIA Public-Key Cryptography
Record Nr. UNINA-9910376345403321
New York : , : ACM, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Attribute-Based Encryption (ABE) : Foundations and Applications Within Blockchain and Cloud Environments / / Qi Xia [and four others]
Attribute-Based Encryption (ABE) : Foundations and Applications Within Blockchain and Cloud Environments / / Qi Xia [and four others]
Autore Xia Qi
Edizione [First edition.]
Pubbl/distr/stampa Hoboken, New Jersey : , : John Wiley & Sons, Inc., , [2024]
Descrizione fisica 1 online resource (275 pages)
Disciplina 005.74
Soggetto topico Public key cryptography
Blockchains (Databases)
ISBN 1-119-98936-1
1-119-98938-8
1-119-98937-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Title Page -- Copyright -- Contents -- About the Authors -- Preface -- Acknowledgments -- Part I Attribute‐Based Encryption (ABE) -- Chapter 1 Foundation of Attribute‐Based Encryption -- 1.1 Introduction -- 1.1.1 Symmetric Encryption -- 1.1.2 Asymmetric Key Encryption -- 1.1.3 Identity‐Based Encryption -- 1.2 Functional Encryption -- 1.2.1 Applications of Attribute‐Based Encryption -- 1.2.2 Problems with Attribute‐Based Encryption -- 1.2.3 A Brief History of Security Proof of Functional Encryption -- 1.2.4 Dual System of Encryption -- 1.2.5 Summary -- References -- Chapter 2 Mathematical Background -- 2.1 Group Theory -- 2.1.1 Law of Composition -- 2.1.2 Groups -- 2.1.3 Subgroups -- 2.1.4 Homomorphisms -- 2.1.5 Cyclic Group -- 2.2 Ring Theory -- 2.2.1 Ideals and Quotient Rings -- 2.2.2 Euler's Totient Function -- 2.2.3 Polynomial Rings -- 2.2.4 Irreducible and Monic Polynomials -- 2.2.5 Field Theory -- 2.2.5.1 Quotient Field -- 2.2.6 Field Characteristic -- 2.2.7 Algebraic Extension Fields -- 2.3 Elliptic Curves -- 2.3.1 Plane Curve -- 2.3.2 Group Operations on Elliptic Curves -- 2.3.2.1 Point Addition -- 2.3.2.2 Point Doubling -- 2.4 Divisors and Bilinear Map -- 2.4.1 Divisors -- 2.4.2 The Degree and Support of D -- 2.4.3 The Divisor of a Function f on E -- 2.4.4 Equivalence of Divisors -- 2.4.5 Bilinear Map -- 2.4.6 Weil Pairing -- 2.4.7 Miller's Algorithm -- 2.4.8 The Tate Pairing -- 2.5 Summary -- References -- Chapter 3 Attribute‐Based Encryption -- 3.1 Introduction -- 3.2 Basic Components of ABE Construction -- 3.2.1 Secret‐Sharing Schemes -- 3.2.2 Polynomial Interpolation -- 3.2.2.1 Polynomials Over the Reals -- 3.2.2.2 Polynomials Modulus P -- 3.2.3 Shamir Secret Sharing -- 3.2.4 Verifiable Secret Sharing (VSS) -- 3.2.4.1 Algorithm for Converting Access Structure Into LSSS Matrix -- 3.2.4.2 Access Structure Example.
3.2.4.3 Algorithms in Attribute‐Based Encryption -- 3.2.5 Properties of Attribute‐Based Encryption -- 3.2.6 Prime Order Group -- 3.3 Cryptographic Hard Assumptions -- 3.3.1 Composite Order Bilinear Groups -- 3.3.2 Complexity Assumptions -- 3.4 Provable Security -- 3.5 Security Notions -- 3.5.1 Summary -- References -- Chapter 4 Data Access Control -- 4.1 Introduction -- 4.1.1 Coarse‐Grained -- 4.1.2 Fine‐Grained Access Control -- 4.1.3 Importance of Fine‐Grained Access Control -- 4.2 Concerns About Cloud‐Based Access Control that Are Trustworthy -- 4.2.1 Encryption Access Control -- 4.2.2 Requirements for Encryption‐Based Access Control -- 4.3 Summary -- References -- Chapter 5 Selective Secure ABE Schemes Based on Prime Order Group -- 5.1 Introduction -- 5.1.1 Selective Security Model for KP‐ABE -- 5.1.2 Selective Security Model for CP‐ABE -- 5.1.3 ABE Schemes -- 5.2 The KP‐ABE Scheme -- 5.2.1 Concrete Scheme Construction -- 5.2.2 Security Proof -- 5.3 The CP‐ABE Scheme -- 5.3.1 Concrete Scheme Construction -- 5.3.2 Security Proof -- 5.4 Summary -- References -- Chapter 6 Fully Secure ABE Schemes Based on Composite and Prime Order Groups -- 6.1 Introduction -- 6.2 A Fully Secure CP‐ABE from Composite Order Group -- 6.2.1 CP‐ABE Construction -- 6.2.2 Adaptive Security Proof -- 6.2.2.1 Description of Hybrids -- 6.2.3 Security Proof -- 6.3 A Fully Secure KP‐ABE Scheme Based on Dual Vector Space -- 6.3.1 KP‐ABE Construction -- 6.3.2 Adaptive Security -- 6.3.3 Security Proof -- 6.4 KP‐ABE Scheme Based on Matrix -- 6.4.1 The Scheme -- 6.4.2 Adaptive Security -- 6.4.3 Security Proof -- 6.5 Summary -- References -- Part II Concepts of Blockchain Technology -- Chapter 7 Blockchain Technology -- 7.1 Introduction -- 7.1.1 History -- 7.1.2 Preliminary Concepts of Blockchain Technology -- 7.1.3 Characteristics of Blockchain.
7.1.4 Evolution and Types of Blockchain -- 7.1.4.1 The Blockchain 1.0 -- 7.1.4.2 Blockchain 2.0 -- 7.1.4.3 Blockchain 3.0 -- 7.1.5 Permissionless vs Permissioned Blockchains -- 7.1.6 Types of Blockchain -- 7.2 Architecture of Blockchain -- 7.2.1 Architecture of Blockchain 1.0 (Cryptocurrencies) -- 7.2.2 Block -- 7.2.3 Node -- 7.2.4 Types of Blockchain Nodes -- 7.2.5 Consensus -- 7.3 Architecture of Blockchain 2.0 (Smart Contracts) -- 7.3.1 Introduction to Smart Contracts -- 7.3.2 How Smart Contracts Work -- 7.3.3 Example of Smart Contract -- 7.3.4 Uses of Smart Contracts -- 7.3.5 Advantages of Smart Contracts -- 7.3.6 Limitations of Smart Contracts -- 7.4 Architecture of Blockchain 3.0 (Blockchain Applications) -- 7.4.1 Consensus Mechanism -- 7.5 Blockchain 4.0 -- 7.5.1 Blockchain 4.0 Applications -- 7.5.2 Metaverse -- 7.5.3 Industrial Revolution 4.0 -- 7.5.4 Blockchain 4.0 for Businesses -- References -- Chapter 8 Scaling‐Out Blockchains with Sharding -- 8.1 Introduction -- 8.1.1 Scalability Trilemma -- 8.1.2 Nakamoto‐Based - Monoxide - Chu‐ko‐nu Mining -- 8.1.3 Elastico -- 8.1.4 OmniLedger -- 8.1.5 Rapid Chain -- 8.1.6 Learnings -- 8.1.7 General Improvements -- 8.1.7.1 Reducing Transaction Latency -- 8.1.7.2 Inter‐Communication Protocol -- 8.1.7.3 Shards Ledger Pruning -- 8.1.7.4 Decentralized Bootstrapping -- 8.1.7.5 Securing the Epoch Reconfiguration -- 8.1.7.6 Sharded Smart Contract -- 8.1.7.7 Replay Attacks and Defenses Against Cross‐Shard Protocols -- 8.2 Off‐Chain Solution: Layer 2 Solutions -- 8.2.1 State Channels -- 8.2.2 Side Chains of the Plasma -- 8.2.3 Problems with Data Accessibility -- 8.3 Rollups -- 8.3.1 Rollups Based on Zero Knowledge -- 8.3.2 Proofs of Zero‐Knowledge -- 8.3.3 Protocol Schnorr -- 8.3.4 Protocol Pedersen -- 8.3.5 zk‐SNARKs -- 8.4 Summary -- References -- Part III Applying Blockchain with Real‐Time Technologies.
Chapter 9 Blockchain Technology for Supply Management -- 9.1 Introduction -- 9.1.1 System Design -- 9.1.2 System Architecture -- 9.1.3 Entities of the System -- 9.1.3.1 Users -- 9.1.4 Smart Contract Control -- 9.1.5 Blockchain Network -- 9.1.5.1 Processing Nodes -- 9.1.5.2 System Application Layer -- 9.1.5.3 Storage Infrastructure -- 9.1.6 System Decryption -- 9.1.7 Blocks -- 9.1.7.1 Block Design -- 9.2 System Flow -- 9.2.1 System Advantages -- 9.2.2 Conclusion -- References -- Chapter 10 Satellite Communication -- 10.1 Introduction -- 10.1.1 Low‐Orbit Constellation Communication Networks -- 10.1.2 Interstellar Link Length -- 10.1.3 Model of Satellite Motion -- 10.1.4 Edge Computing Technologies -- 10.2 Analysis of Edge Computing Requirements of Low‐Orbit Constellation Communication Networks -- 10.2.1 Design of Edge Computing Architecture for Low‐Orbit Constellation Communication Networks -- 10.2.2 Satellite -- 10.2.3 System Entities -- 10.2.4 System Process Flow -- 10.2.5 Security Properties -- 10.3 Summary -- References -- Chapter 11 Foundation of Information‐Centric Communication -- 11.1 Introduction -- 11.2 Information‐Centric Communication -- 11.3 Name‐Based Routing of Content -- 11.4 Benefits of Using ICN -- 11.5 Cost‐Efficient and Scalable Distribution of Content Design Principles -- 11.6 ICN Design Challenges -- 11.6.1 Content Naming -- 11.6.2 Caching of Content -- 11.6.3 Data Integrity -- 11.6.4 Resolution System's Scalability and Name‐Based Routing -- References -- Chapter 12 Security Overall in Information‐Centric Networks -- 12.1 Introduction -- 12.2 Content‐Centric Network (CCN) Architecture -- 12.3 Naming System Design -- 12.4 Secure Naming Scheme for Information‐Centric Networks -- 12.5 Data Transmission - Content Delivery -- 12.6 Traffic Load in Network Caching -- 12.6.1 Store Unique Naming of Content in Caches.
12.6.2 Storage Limitation in Caching Space Devices -- 12.7 Content's Freshness Detection -- 12.8 ICN Security -- 12.9 Attacks in ICN Architectures -- 12.10 ICN Attributes to Ensure Security Threats -- 12.11 Traffic Analysis and Prediction -- 12.12 Some Key Problem Statements -- 12.13 Blockchain‐Based ICN Scheme Improvement -- 12.13.1 Protection Against DDos -- 12.14 A Secured Information‐Centric Network Based on Blockchain -- 12.14.1 Blockchain‐Based ICN Structure -- 12.14.1.1 Data Integrity -- 12.15 Attribute‐Based Encryption Scheme for the Information‐Centric Network -- 12.15.1 Applying Ciphertext‐Policy ABE (CP‐ABE) Scheme in ICN -- 12.15.2 System Design of CP‐ABE Scheme in ICN -- References -- Chapter 13 Subscriber Data Management System Based on Blockchain -- 13.1 Introduction -- 13.1.1 Motivation -- 13.1.2 Problem Statement -- 13.1.3 Contributions -- 13.2 Literature Review -- 13.3 System Design Description -- 13.3.1 Assumptions -- 13.3.2 Ciphertext‐Policy Attribute‐Based Encryption (CP‐ABE) -- 13.3.3 CP‐ABE Construction -- 13.3.4 System Components -- 13.3.4.1 Data Subscribers (DSs) -- 13.3.4.2 Data Providers (DPs) -- 13.3.4.3 Key Generation and Distribution Center (KGDC) -- 13.3.4.4 IPFS Distributed Storage -- 13.3.4.5 Blockchain Platform -- 13.3.5 Process Description -- 13.3.5.1 Subscriber Registration -- 13.3.5.2 Subscriber Data Storage -- 13.3.5.3 Subscriber Data Request -- 13.3.6 Benefits of Proposed Design -- 13.3.7 Security Requirements -- 13.4 Summary -- References -- Chapter 14 A Secure Data‐Sharing Blockchain‐Based Crowdfunding System -- 14.1 Introduction -- 14.2 Literature Review -- 14.2.1 Present‐Day Centralized Crowdfunding -- 14.2.2 Crowdfunding Models -- 14.2.3 Problems of Traditional Crowdfunding -- 14.2.4 Blockchain‐Based Crowdfunding -- 14.2.5 Advantages of Blockchain‐Based Crowdfunding -- 14.3 Proposed System.
14.3.1 System Model.
Record Nr. UNINA-9910830912003321
Xia Qi  
Hoboken, New Jersey : , : John Wiley & Sons, Inc., , [2024]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Identity-based cryptography [[electronic resource] /] / edited by Marc Joye and Gregory Neven
Identity-based cryptography [[electronic resource] /] / edited by Marc Joye and Gregory Neven
Pubbl/distr/stampa Amsterdam ; ; Boston, : IOS Press, c2009
Descrizione fisica 1 online resource (272 p.)
Disciplina 005.8/2
Altri autori (Persone) JoyeMarc <1969->
NevenGregory
Collana Cryptology and information security series
Soggetto topico Data encryption (Computer science)
Public key cryptography
Soggetto genere / forma Electronic books.
ISBN 6612070609
1-282-07060-6
9786612070600
1-4416-0552-5
600-00-1260-8
1-60750-389-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Title page; Foreword; Contents; Introduction to Identity-Based Cryptography; Pairings on Elliptic Curves; Identity-Based Signatures; Identity-Based Encryption and Hierarchical Identity-Based Encryption; Flexible IBE and Beyond in the Commutative-Blinding Framework; Generalized IBE in the Exponent-Inversion Framework; Forward-Secure Hierarchical IBE with Applications to Broadcast Encryption; Identity-Based Identification and Signature Schemes Using Error Correcting Codes; Certificateless Encryption; Attribute-Based Encryption; On Generic Groups and Related Bilinear Problems
Software Implementation of PairingsHardware Implementation of Pairings; Implementation Attacks & Countermeasures; Bibliography; Author Index
Record Nr. UNINA-9910454036003321
Amsterdam ; ; Boston, : IOS Press, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Identity-based cryptography [[electronic resource] /] / edited by Marc Joye and Gregory Neven
Identity-based cryptography [[electronic resource] /] / edited by Marc Joye and Gregory Neven
Pubbl/distr/stampa Amsterdam ; ; Boston, : IOS Press, c2009
Descrizione fisica 1 online resource (272 p.)
Disciplina 005.8/2
Altri autori (Persone) JoyeMarc <1969->
NevenGregory
Collana Cryptology and information security series
Soggetto topico Data encryption (Computer science)
Public key cryptography
ISBN 6612070609
1-282-07060-6
9786612070600
1-4416-0552-5
600-00-1260-8
1-60750-389-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Title page; Foreword; Contents; Introduction to Identity-Based Cryptography; Pairings on Elliptic Curves; Identity-Based Signatures; Identity-Based Encryption and Hierarchical Identity-Based Encryption; Flexible IBE and Beyond in the Commutative-Blinding Framework; Generalized IBE in the Exponent-Inversion Framework; Forward-Secure Hierarchical IBE with Applications to Broadcast Encryption; Identity-Based Identification and Signature Schemes Using Error Correcting Codes; Certificateless Encryption; Attribute-Based Encryption; On Generic Groups and Related Bilinear Problems
Software Implementation of PairingsHardware Implementation of Pairings; Implementation Attacks & Countermeasures; Bibliography; Author Index
Record Nr. UNINA-9910782847503321
Amsterdam ; ; Boston, : IOS Press, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Identity-based cryptography [[electronic resource] /] / edited by Marc Joye and Gregory Neven
Identity-based cryptography [[electronic resource] /] / edited by Marc Joye and Gregory Neven
Pubbl/distr/stampa Amsterdam ; ; Boston, : IOS Press, c2009
Descrizione fisica 1 online resource (272 p.)
Disciplina 005.8/2
Altri autori (Persone) JoyeMarc <1969->
NevenGregory
Collana Cryptology and information security series
Soggetto topico Data encryption (Computer science)
Public key cryptography
ISBN 6612070609
1-282-07060-6
9786612070600
1-4416-0552-5
600-00-1260-8
1-60750-389-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Title page; Foreword; Contents; Introduction to Identity-Based Cryptography; Pairings on Elliptic Curves; Identity-Based Signatures; Identity-Based Encryption and Hierarchical Identity-Based Encryption; Flexible IBE and Beyond in the Commutative-Blinding Framework; Generalized IBE in the Exponent-Inversion Framework; Forward-Secure Hierarchical IBE with Applications to Broadcast Encryption; Identity-Based Identification and Signature Schemes Using Error Correcting Codes; Certificateless Encryption; Attribute-Based Encryption; On Generic Groups and Related Bilinear Problems
Software Implementation of PairingsHardware Implementation of Pairings; Implementation Attacks & Countermeasures; Bibliography; Author Index
Record Nr. UNINA-9910814080203321
Amsterdam ; ; Boston, : IOS Press, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui