Anonymous Identity-Based Identification Scheme in Ad-Hoc Groups without Pairings (Englisch)
- Neue Suche nach: Barapatre, P.
- Neue Suche nach: Rangan, C.P.
- Neue Suche nach: Barapatre, P.
- Neue Suche nach: Rangan, C.P.
- Neue Suche nach: Gierlichs, Benedikt
- Neue Suche nach: Guilley, Sylvain
- Neue Suche nach: Mukhopadhyay, Debdeep
In:
Security, privacy, and applied cryptography engineering; SPACE 2013
8204
;
130-146
;
2013
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:Anonymous Identity-Based Identification Scheme in Ad-Hoc Groups without Pairings
-
Beteiligte:Barapatre, P. ( Autor:in ) / Rangan, C.P. ( Autor:in ) / Gierlichs, Benedikt / Guilley, Sylvain / Mukhopadhyay, Debdeep
-
Kongress:International conference; 3rdd, Security, privacy, and applied cryptography engineering; SPACE 2013 ; 2013 ; Kharagpur, India
-
Erschienen in:Security, privacy, and applied cryptography engineering; SPACE 2013 , 8204 ; 130-146LECTURE NOTES IN COMPUTER SCIENCE , 8204 ; 130-146
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Heidelberg
-
Erscheinungsdatum:01.01.2013
-
Format / Umfang:17 pages
-
Anmerkungen:Includes bibliographical references and index. Also issued online.
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Three Design Dimensions of Secure Embedded SystemsSchaumont, P. / Aysu, A. et al. | 2013
- 21
-
Investigating the Application of One Instruction Set Computing for Encrypted Data ComputationTsoutsos, N.G. / Maniatakos, M. et al. | 2013
- 38
-
Alphanumeric Shellcode Generator for ARM ArchitectureKumar, P. / Chowdary, N. / Mathuria, A. et al. | 2013
- 40
-
SIMD-Based Implementations of Sieving in Integer-Factoring AlgorithmsSengupta, B. / Das, A. et al. | 2013
- 56
-
Strong Security and Privacy of RFID System for Internet of Things InfrastructureDas, M.L. et al. | 2013
- 70
-
Correlation-Immune Boolean Functions for Leakage Squeezing and Rotating S-Box Masking against Side Channel AttacksCarlet, C. et al. | 2013
- 75
-
A Time Series Approach for Profiling AttackLerman, L. / Bontempi, G. / Taieb, S.B. / Markowitch, O. et al. | 2013
- 95
-
Algorithms for Switching between Boolean and Arithmetic Masking of Second OrderVadnala, P.K. / Grossschadl, J. et al. | 2013
- 111
-
Identity-Based Identification Schemes from ID-KEMsBarapatre, P. / Rangan, C.P. et al. | 2013
- 130
-
Anonymous Identity-Based Identification Scheme in Ad-Hoc Groups without PairingsBarapatre, P. / Rangan, C.P. et al. | 2013
- 147
-
Dynamic Attribute Based Group Signature with Attribute Anonymity and Tracing in the Standard ModelAli, S.T. / Amberker, B.B. et al. | 2013
- 172
-
From Selective-ID to Full-ID IBS without Random OraclesChatterjee, S. / Kamath, C. et al. | 2013