Pp1t
Ryan_Holt_MS_Thesis_Project
Securing Critical Unattended Systems with Identity Based Cryptography A Case Study Johannes Blömer, Peter Günther University of Paderborn Volker Krummel.
Dual System Encryption: Realizing IBE and HIBE from Simple Assumptions Brent Waters.
Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers Short Position Paper for IEEE POLICY 2009 Carl A. Gunter University.
Identity Based Cryptography James Higdon, Sameer Sherwani CpSc 624/424.
Identity Based Cryptography
Dual System Encryption: Realizing IBE and HIBE from Simple Assumptions
Things that Cryptography Can Do
Things that Cryptography Can Do Shai Halevi – IBM Research NYU Security Research Seminar April 1, 2014 1.