Welcome![Sign In][Sign Up]
Location:
Search - identity based

Search list

[Other resourceshamir ID

Description: 介绍了一种特殊的公钥密码体制——基于身份的公钥密码体制。本文相当经典,是目前商用密码体制的经典思想。-introduced a special public-key cryptosystem -- identity-based public-key cryptosystem. This very classic, which is the business Cryptosystem classic thinking.
Platform: | Size: 279583 | Author: 张进 | Hits:

[Other resource01684946

Description: A New Identity-based Proxy Signature Scheme from Bilinear Pairings-A New Identity-based Proxy Signature Sche me from Bilinear Pairings
Platform: | Size: 816383 | Author: zouning | Hits:

[Crack Hackibe-0.7.2

Description: The Stanford IBE library is a C implementation of the Boneh-Franklin identity-based encryption scheme. (See Boneh and Franklin, \"Identity-Based Encryption from the Weil Pairing\", CRYPTO 2001.) There are a few modifications and additions. The Boneh-Franklin scheme is used as a Key Encapsulation Mechanism, and off-the-shelf ciphers and HMACs are used for the actual encryption. (See Lynn, \"Authenticated Identity-Based Encryption\", available on eprint.
Platform: | Size: 98261 | Author: 高超 | Hits:

[Crack Hackibe-0.7

Description: 斯坦福大学密码学家Boneh的基于身份的公钥密码系统-Stanford University passwords Jurists Boneh the identity-based public-key cryptosystem
Platform: | Size: 99067 | Author: 周渊 | Hits:

[Crack Hackibe-0.7

Description: 斯坦福大学密码学家Boneh的基于身份的公钥密码系统-Stanford University passwords Jurists Boneh the identity-based public-key cryptosystem
Platform: | Size: 98304 | Author: 周渊 | Hits:

[Industry researchshamir ID

Description: 介绍了一种特殊的公钥密码体制——基于身份的公钥密码体制。本文相当经典,是目前商用密码体制的经典思想。-introduced a special public-key cryptosystem-- identity-based public-key cryptosystem. This very classic, which is the business Cryptosystem classic thinking.
Platform: | Size: 279552 | Author: 张进 | Hits:

[Other01684946

Description: A New Identity-based Proxy Signature Scheme from Bilinear Pairings-A New Identity-based Proxy Signature Sche me from Bilinear Pairings
Platform: | Size: 816128 | Author: zouning | Hits:

[DocumentsbasedonID

Description: 利用椭圆曲线9GH 群上的双线性,构建了一种基于身份的三方弱型签密协议,提供密文鉴别、报文机密、签名非否认等安全特 性,摆脱了4+I 体系的约束,提高了计算效率,为在线交易和支付提供一种安全高效的一体化解决方案。-Use of elliptic curve 9GH group on bilinear, build an identity-based signcryption weak tripartite agreement, to provide ciphertext authentication, message confidentiality, signature security features, such as non-repudiation, from the 4+ I system constraints, improve the computational efficiency for online transactions and payments to provide a safe and efficient integration solutions.
Platform: | Size: 159744 | Author: 张莹 | Hits:

[Software Engineeringdentity-Based

Description: 使用威尔配对,本文提出了一种基于身份的环签密方案,给出了具体的算法.该方案能够使消息的 发送者以一种完全匿名的方式发送消息,并且同时实现保密性和认证性两种功能.我们证明了在决策双线性Diffie- Hellman问题难解的假设下,新提出的方案对自适应选择密文攻击是安全的.与传统的先签名后加密的方案 相比,本方案中密文长度有了明显的降低,在低带宽的要求下更加可行.-Will the use of matching, this paper, a ring of identity-based signcryption program, given a specific algorithm. The program will enable the sender information in a completely anonymous way to send messages, and at the same time to achieve confidentiality and authentication of two functions. We prove that in the decision-making bilinear Diffie-Hellman problem difficult to resolve under the assumption that the new proposal for adaptive chosen ciphertext attack is safe. with the traditional first signed encrypted program compared ciphertext of the program significantly reduced the length, in the low-bandwidth request more feasible.
Platform: | Size: 98304 | Author: 张莹 | Hits:

[Crack Hackpbc-0.4.9.tar

Description: 这是一个C的源代码,用来实现基于身份的加密算法-This is a C source code, used for identity-based encryption algorithm
Platform: | Size: 487424 | Author: 李秀 | Hits:

[Crack Hackibe-0.7.2

Description: The Stanford IBE library is a C implementation of the Boneh-Franklin identity-based encryption scheme. (See Boneh and Franklin, "Identity-Based Encryption from the Weil Pairing", CRYPTO 2001.) There are a few modifications and additions. The Boneh-Franklin scheme is used as a Key Encapsulation Mechanism, and off-the-shelf ciphers and HMACs are used for the actual encryption. (See Lynn, "Authenticated Identity-Based Encryption", available on eprint.
Platform: | Size: 98304 | Author: 高超 | Hits:

[ApplicationsIdentityCardQuery

Description: IdentityCardQuery是一个基于ado身份证查询系统,包括多表操作,查询,添加,删除等.-IdentityCardQuery is an identity based on the ado query system, including multi-table operation, query, add, delete and so on.
Platform: | Size: 115712 | Author: dxk | Hits:

[JSPjava

Description: 本书以大量精简的实例介绍了Java安全性编程方面的概念和技术,全书共计9章。 经过精心设计,每个小节的实例着重说明一个问题,又相互贯穿和联系。涉及Java加密和解密,反编译和反反编译,对类、成员变量、方法的攻击和保护,消息摘要,消息验证码,数字签名,口令保护,数字证书和证书链的生成、签发、检验和维护,SSL和HTTPS客户及服务器程序、基于代码位置和签发者的授权,签名Java Applet,基于身份的验证和授权(JAAS)等。 全书的实例极为精简,只保留了能够说明问题的代码,而又可真正运行,便于Java入门者轻松掌握安全性方面繁杂的概念。适合于适合于初步了解Java语法的学习者,也适合于安全技术的入门及高校Java教学参考。 -This book introducte the Java security programming concepts and techniques by a large number of examples ,book total of 9 chapters. Carefully designed, each section highlights examples of a problem, and contact each other throughout. Involving Java encryption and decryption, decompile and compile counter of class, member variables, methods of attack and protection, message digest, message authentication codes, digital signatures, password protection, digital certificate and certificate chain generation, issuance, inspection and maintenance, SSL and HTTPS clients and server program, based on code location and issuer of the authorized signature Java Applet, identity-based authentication and authorization (JAAS) and so on. Examples of the book is extremely streamlined, leaving only the problem that can code and who can really run, easy to Java beginners to easily grasp complex security concepts.
Platform: | Size: 2375680 | Author: wang chao | Hits:

[Crack Hackibe.tar

Description: IBE加密算法的入门文章Identity-Based Encryption from the Weil Pairing-IBE encryption algorithm of the article Introduction to Identity-Based Encryption from the Weil Pairing
Platform: | Size: 264192 | Author: pandora | Hits:

[Crack Hackibe-0.7.2-win

Description: 这是一个windows环境下实现基于身份的PKI系统源码,由stanford大学开发。采用了椭圆曲线密码公钥系统和配对椭圆曲线计算(Tate Pairing),具有非常高的效率. -This is a windows environment to achieve identity-based PKI system source code, developed by the University of stanford. Use of Elliptic Curve Cryptography public key pair system and the elliptic curve calculation (Tate Pairing), with very high efficiency.
Platform: | Size: 563200 | Author: alan | Hits:

[Windows DevelopIBEmiracl

Description: Windows环境下可调试的一个IBE算法,包括Setup、Extract、Encrypt和Decpty过程。对于设计基于身份的电子邮箱、加密系统等具有较高的应用价值。-Windows environment can be an IBE algorithm debugging, including Setup, Extract, Encrypt and Decpty process. For the design of e-mail identity-based encryption system has a high application value.
Platform: | Size: 727040 | Author: beyond | Hits:

[OS programacs4.0-build-24

Description: Cisco Secure ACS 4.0 CISCO SECURE ACCESS CONTROL SERVER 4.0 FOR WINDOWS 思科® 安全访问控制服务器为思科智能信息网络提供基于身份的全面的访问控制解决方案。它是用于管理企业网络用户、管理员和网络基础设施资源的集成和控制层。 Cisco® Secure ACS (ACS)是具高可扩展性的高性能访问控制服务器,可作为集中的RADIUS 和 TACACS+ 服务器运行。Cisco Secure ACS将验证、用户访问和管理员访问与策略控制结合在一个集中的身份识别网络解决方案中,因此提高了灵活性、移动性、安全性和用户生产率, 从而进一步增强了访问安全性。它针对所有用户执行统一安全策略,不受用户网络访问方式的影响。它减轻了与扩展用户和网络管理员访问权限相关的管理负担。通过对所有用户帐户使用一个集中数据库,Cisco Secure ACS可集中控制所有的用户权限并将他们分配到网络中的几百甚至几千个接入点。对于记帐服务,Cisco Secure ACS针对网络用户的行为提供具体的报告和监控功能,并记录整个网络上每次的访问连接和设备配置变化。这个特性对于企业遵守Sarbanes Oxley法规尤其重要。Cisco Secure ACS支持广泛的访问连接,包括有线和无线局域网、宽带、内容、存储、IP上的语音(VoIP)、防火墙和VPN等。-Cisco Secure ACS 4.0 CISCO SECURE ACCESS CONTROL SERVER 4.0 FOR WINDOWS Cisco ® Secure Access Control Server for Cisco intelligent information network to provide a comprehensive identity-based access control solutions. It is used to manage enterprise network users, administrators and network infrastructure resources, integration and control layer. Cisco ® Secure ACS (ACS) is a highly scalable, high-performance access control server, as a centralized RADIUS and TACACS+ server is running. Cisco Secure ACS to verify user access and administrator access with policy control in conjunction with a centralized identity networking solutions, and therefore increased the flexibility, mobility, security and user productivity, and thus further enhance the safety of the visit. For all users of its implementation of a unified security policy, from the user mode of network access. Reduced with the expansion of its users and network administrators manage access-related burden. All user a
Platform: | Size: 44461056 | Author: 蔡建国 | Hits:

[Crack HackIbe_dec

Description: IBE基于身份的加密系统的解密程序,使用VC6.0开发-IBE identity-based encryption system of the decryption process, using VC6.0 Development
Platform: | Size: 1475584 | Author: guoshaolong | Hits:

[Crack HackIbe_ext

Description: IBE基于身份的加密系统的身份提取程序,使用VC6.0开发,即把身份转换成椭圆曲线上的点-IBE identity-based encryption system of the identity of extraction procedures, using VC6.0 development, namely, the identity into a point on the elliptic curve
Platform: | Size: 1472512 | Author: guoshaolong | Hits:

[OtherIdentity-Based_Cryptosystems

Description: Identity-based cryptography refers to a set of public key cryptographic primitives where public keys consist of users’ identity information and nothing else. Its advantage is to alleviate the need for digital certificates linking public keys to the identity of the corresponding user.
Platform: | Size: 551936 | Author: kimkimkim2012 | Hits:
« 12 3 4 5 6 7 8 9 10 ... 22 »

CodeBus www.codebus.net