Citation Details

Chapter

Toward Hierarchical Identity-Based Encryption

Advances in Cryptology — EUROCRYPT 2002, 2002, Volume 2332

ISBN : 978-3-540-43553-2

Jeremy Horwitz, Ben Lynn

285 Items cite this Chapter

Page: 1 | 2 | 3 | > | >>

Chapter

Network-Based Information Systems

Chizuro Sakamoto, Giuseppe De Marco, Rihito Yaegashi, Masaru Tadauchi and Leonard Barolli

Series: Lecture Notes in Computer Science, Year: 2007, Volume 4658, Page 108

Read Online

Chapter

Pairing-Based Cryptography – Pairing 2013

Chitchanok Chuengsatiansup, Michael Naehrig, Pance Ribarski and Peter Schwabe

Series: Lecture Notes in Computer Science, Year: 2014, Volume 8365, Page 229

Read Online

Chapter

Encyclopedia of Cryptography and Security

Benoît Libert and Jean-Jacques Quisquater

Year: 2011, Page 588

Read Online

Article

Efficient revocable identity-based encryption via subset difference methods

Kwangsu Lee, Dong Hoon Lee and Jong Hwan Park

Journal: Designs, Codes and Cryptography, 2017, Volume 85, Number 1, Page 39

Read Online

Article

An Access Control Method Based on HABE Applying in Smart Grid

远鹏 谢

Journal: Smart Grid, 2015, Volume 05, Number 03, Page 93

Read Online

Chapter

Information and Communications Security

Nuttapong Attrapadung, Goichiro Hanaoka and Shota Yamada

Series: Lecture Notes in Computer Science, Year: 2015, Volume 8958, Page 176

Read Online

Article

Efficient hierarchical identity based signature scheme in the standard model

Yanli Ren and Dawu Gu

Journal: Wuhan University Journal of Natural Sciences, 2008, Volume 13, Number 6, Page 665

Read Online

Article

Hierarchical Certificate-Based Encryption: Definition and an Efficient Construction

Hai Lin Xu and Yang Lu

Journal: Applied Mechanics and Materials, 2014, Volume 513-517, Page 1971

Read Online

Article

Privacy-preserving hierarchical deterministic key generation based on a lattice of rings in public blockchain

S. Banupriya, Kottilingam Kottursamy and Ali Kashif Bashir

Journal: Peer-to-Peer Networking and Applications, 2021, Volume 14, Number 5, Page 2813

Read Online

Conference Paper

On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud

William C. Garrison, Adam Shull, Steven Myers and Adam J. Lee

Conference: 2016 IEEE Symposium on Security and Privacy (SP), Year: 2016, Page 819

Read Online

citation rank

99th
percentile

Citations per year

20022024

citing books

See More
See Less