Identity-based cryptography (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Identity-based cryptography" in English language version.

refsWebsite
Global rank English rank
2nd place
2nd place
1st place
1st place
207th place
136th place
274th place
309th place
low place
low place
9,207th place
5,645th place
18th place
17th place
5th place
5th place
5,032nd place
3,357th place
652nd place
515th place
11th place
8th place
14th place
14th place

archive.today

bristol.ac.uk

cesg.gov.uk

doi.org

  • Shamir, Adi (1985). "Identity-Based Cryptosystems and Signature Schemes" (PDF). In Blakley, George Robert; Chaum, David (eds.). Advances in Cryptology Proceedings of CRYPTO '84. Lecture Notes in Computer Science. Vol. 196 (1 ed.). Springer Berlin Heidelberg. pp. 47–53. doi:10.1007/3-540-39568-7_5. ISBN 978-3-540-39568-3. Archived (PDF) from the original on 26 July 2018. Retrieved 30 October 2024.
  • Cocks, Cliff (2001). "An Identity Based Encryption Scheme Based on Quadratic Residues". Cryptography and Coding (PDF). Lecture Notes in Computer Science. Vol. 2260/2001. Springer. pp. 360–363. CiteSeerX 10.1.1.116.5477. doi:10.1007/3-540-45325-3_32. ISBN 978-3-540-43026-1. Archived from the original (PDF) on 2007-02-06.
  • Okamoto, E. (1986). "Proposal for identity-based key distribution systems". Electronics Letters. 22 (24): 1283–1284. Bibcode:1986ElL....22.1283O. doi:10.1049/el:19860880. ISSN 0013-5194.
  • Green, Matthew; Miers, Ian (17 May 2015). "Forward Secure Asynchronous Messaging from Puncturable Encryption". 2015 IEEE Symposium on Security and Privacy. ACM (published 20 July 2015). pp. 305–320. doi:10.1109/SP.2015.26. ISBN 978-1-4673-6949-7. S2CID 9171925. Archived from the original on 8 June 2021. Retrieved 8 June 2021.

harvard.edu

ui.adsabs.harvard.edu

iacr.org

eprint.iacr.org

ieee.org

ieeexplore.ieee.org

psu.edu

citeseerx.ist.psu.edu

semanticscholar.org

api.semanticscholar.org

springer.com

link.springer.com

  • Shamir, Adi (1985). "Identity-Based Cryptosystems and Signature Schemes" (PDF). In Blakley, George Robert; Chaum, David (eds.). Advances in Cryptology Proceedings of CRYPTO '84. Lecture Notes in Computer Science. Vol. 196 (1 ed.). Springer Berlin Heidelberg. pp. 47–53. doi:10.1007/3-540-39568-7_5. ISBN 978-3-540-39568-3. Archived (PDF) from the original on 26 July 2018. Retrieved 30 October 2024.

web.archive.org

  • Shamir, Adi (1985). "Identity-Based Cryptosystems and Signature Schemes" (PDF). In Blakley, George Robert; Chaum, David (eds.). Advances in Cryptology Proceedings of CRYPTO '84. Lecture Notes in Computer Science. Vol. 196 (1 ed.). Springer Berlin Heidelberg. pp. 47–53. doi:10.1007/3-540-39568-7_5. ISBN 978-3-540-39568-3. Archived (PDF) from the original on 26 July 2018. Retrieved 30 October 2024.
  • Cocks, Cliff (2001). "An Identity Based Encryption Scheme Based on Quadratic Residues". Cryptography and Coding (PDF). Lecture Notes in Computer Science. Vol. 2260/2001. Springer. pp. 360–363. CiteSeerX 10.1.1.116.5477. doi:10.1007/3-540-45325-3_32. ISBN 978-3-540-43026-1. Archived from the original (PDF) on 2007-02-06.
  • "Dr Clifford Cocks CB, Honorary Doctor of Science". University of Bristol. Archived from the original on 2015-06-27.

worldcat.org

search.worldcat.org