Introduction to identity-based encryption [electronic resource] / Luther Martin.
"For professionals looking to fully understand and effectively implement identity-based encryption (IBE) technology, this authoritative resource is a smart choice. Until now, details on IBE could only be found scattered throughout journal articles and conference proceedings. This unique volume...
Saved in:
Online Access: |
Full Text (via IEEE) |
---|---|
Main Author: | |
Format: | Electronic eBook |
Language: | English |
Published: |
Boston :
Artech House,
©2008.
|
Series: | Artech House information security and privacy series.
|
Subjects: |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | in00000243898 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 090829s2008 maua ob 001 0 eng d | ||
005 | 20240903194431.4 | ||
019 | |a 503447744 |a 647824474 |a 654601565 |a 961497652 |a 962576724 |a 966214586 |a 988443171 |a 992064409 |a 995010493 |a 1037526484 |a 1038567505 |a 1045500531 |a 1055341687 |a 1062858557 |a 1062895503 |a 1076310042 |a 1081240554 |a 1137141432 | ||
020 | |a 9781596932395 |q (electronic bk.) | ||
020 | |a 1596932392 |q (electronic bk.) | ||
020 | |z 9781596932388 |q (hbk.) | ||
020 | |z 1596932384 |q (hbk.) | ||
029 | 1 | |a AU@ |b 000051374309 | |
029 | 1 | |a AU@ |b 000069372839 | |
029 | 1 | |a DEBBG |b BV043074293 | |
029 | 1 | |a DEBSZ |b 421964731 | |
029 | 1 | |a GBVCP |b 802981828 | |
029 | 1 | |a NZ1 |b 13336218 | |
035 | |a (OCoLC)ieee434586645 | ||
035 | |a (OCoLC)434586645 |z (OCoLC)503447744 |z (OCoLC)647824474 |z (OCoLC)654601565 |z (OCoLC)961497652 |z (OCoLC)962576724 |z (OCoLC)966214586 |z (OCoLC)988443171 |z (OCoLC)992064409 |z (OCoLC)995010493 |z (OCoLC)1037526484 |z (OCoLC)1038567505 |z (OCoLC)1045500531 |z (OCoLC)1055341687 |z (OCoLC)1062858557 |z (OCoLC)1062895503 |z (OCoLC)1076310042 |z (OCoLC)1081240554 |z (OCoLC)1137141432 | ||
040 | |a N$T |b eng |e pn |c N$T |d OCLCQ |d MEAUC |d OCLCE |d E7B |d OCLCQ |d YDXCP |d OCLCQ |d OCLCF |d OCLCQ |d NLGGC |d OCLCQ |d AZK |d LOA |d JBG |d COCUF |d AGLDB |d CNNOR |d MOR |d PIFAG |d OTZ |d LIV |d OCLCQ |d STF |d BRL |d WRM |d VTS |d NRAMU |d VT2 |d CUY |d COO |d OCLCQ |d WYU |d A6Q |d ICG |d U3G |d UKAHL |d OCLCQ |d K6U |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
049 | |a GWRE | ||
050 | 4 | |a QA76.9.A25 |b M374 2008eb | |
100 | 1 | |a Martin, Luther. |0 http://id.loc.gov/authorities/names/nb2009021023 | |
245 | 1 | 0 | |a Introduction to identity-based encryption |h [electronic resource] / |c Luther Martin. |
260 | |a Boston : |b Artech House, |c ©2008. | ||
300 | |a 1 online resource (xiv, 232 pages) : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a volume |b nc |2 rdacarrier | ||
490 | 1 | |a Artech House information security and privacy series | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Introduction -- Basic mathematical concepts and properties -- Properties of elliptic curves -- Divisors and the Tate pairing -- Cryptography and computational complexity -- Related cryptographic algorithms -- The Cocks IBE scheme -- Boneh-Franklin IBE -- Boneh-Boyen IBE -- Sakai-Kasahara IBE -- Hierarchial IBE and master secret sharing -- Calculating pairings. | |
520 | 1 | |a "For professionals looking to fully understand and effectively implement identity-based encryption (IBE) technology, this authoritative resource is a smart choice. Until now, details on IBE could only be found scattered throughout journal articles and conference proceedings. This unique volume offers complete, easy-to-understand guidance."--Jacket | |
588 | 0 | |a Print version record. | |
650 | 0 | |a Data encryption (Computer science) |0 http://id.loc.gov/authorities/subjects/sh94001524 | |
650 | 0 | |a Public key cryptography. |0 http://id.loc.gov/authorities/subjects/sh00004804 | |
650 | 0 | |a Public key infrastructure (Computer security) |0 http://id.loc.gov/authorities/subjects/sh2002004634 | |
650 | 7 | |a Data encryption (Computer science) |2 fast | |
650 | 7 | |a Public key cryptography. |2 fast | |
650 | 7 | |a Public key infrastructure (Computer security) |2 fast | |
758 | |i has work: |a Introduction to identity-based encryption (Text) |1 https://id.oclc.org/worldcat/entity/E39PCG9TYyMt4b8dxrbpMPQC8K |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Martin, Luther. |t Introduction to identity-based encryption. |d Boston : Artech House, ©2008 |z 9781596932388 |z 1596932384 |w (DLC) 2008297861 |w (OCoLC)176984027 |
856 | 4 | 0 | |u https://colorado.idm.oclc.org/login?url=https://ieeexplore.ieee.org/servlet/opac?bknumber=9100752 |z Full Text (via IEEE) |
830 | 0 | |a Artech House information security and privacy series. |0 http://id.loc.gov/authorities/names/no2007048455 | |
915 | |a - | ||
944 | |a MARS - RDA ENRICHED | ||
956 | |a Artech House eBooks | ||
956 | |b IEEE Xplore Artech House eBooks Library | ||
994 | |a 92 |b COD | ||
998 | |b New collection ieee.artechbooks | ||
999 | f | f | |s 332d5ea7-40fa-480c-8f54-a41cafeebaf8 |i f8b4d70f-a1cf-4d1e-bbbd-5b230731a412 |
952 | f | f | |p Can circulate |a University of Colorado Boulder |b Online |c Online |d Online |e QA76.9.A25 M374 2008eb |h Library of Congress classification |i web |