Author:
Lim H. W.,Robshaw M. J. B.
Publisher
Springer Berlin Heidelberg
Reference6 articles.
1. Lecture Notes in Computer Science;D. Boneh,2001
2. Paterson, K.G., Price, G.: A Comparison between Traditional Public Key Infrastructures and Identity-Based Cryptography. Information Security Technical Report 8(3), 57–72 (2003)
3. Pearlman, L., Welch, V., Foster, I., Kesselman, C., Tuecke, S.: A Community Authorization Service for Group Collaboration. In: Proceedings of the 3rd IEEE InternationalWorkshop on Policies for Distributed Systems and Networks (POLICY 2002), June 2002, pp. 50–59 (2002)
4. Lecture Notes in Computer Science;A. Shamir,1985
5. Stading, T.: Secure Communication in a Distributed System Using Identity Based Encryption. In: Proceedings of 3rd IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2003), May 2003, pp. 414–420 (2003)
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献