Certificateless Public Key Cryptography View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2003

AUTHORS

Sattam S. Al-Riyami , Kenneth G. Paterson

ABSTRACT

This paper introduces and makes concrete the concept of certificateless public key cryptography (CL-PKC), a model for the use of public key cryptography which avoids the inherent escrow of identity-based cryptography and yet which does not require certificates to guarantee the authenticity of public keys. The lack of certificates and the presence of an adversary who has access to a master key necessitates the careful development of a new security model. We focus on certificateless public key encryption (CL-PKE), showing that a concrete pairing-based CL-PKE scheme is secure provided that an underlying problem closely related to the Bilinear Diffie-Hellman Problem is hard. More... »

PAGES

452-473

References to SciGraph publications

  • 2002-09-05. Certification of Public Keys within an Identity Based System in INFORMATION SECURITY
  • 2005-06-16. Identity-based and self-certified key-exchange protocols in INFORMATION SECURITY AND PRIVACY
  • 2002. Implementing the Tate Pairing in ALGORITHMIC NUMBER THEORY
  • 2001-05-18. Self-certified public keys in ADVANCES IN CRYPTOLOGY — EUROCRYPT ’91
  • 1998. Relations among notions of security for public-key encryption schemes in ADVANCES IN CRYPTOLOGY — CRYPTO '98
  • 1997. Self-certified keys — Concepts and Applications in COMMUNICATIONS AND MULTIMEDIA SECURITY
  • 2001-05-18. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack in ADVANCES IN CRYPTOLOGY — CRYPTO ’91
  • 2003-05-13. Certificate-Based Encryption and the Certificate Revocation Problem in ADVANCES IN CRYPTOLOGY — EUROCRYPT 2003
  • 2003-02-28. Access Control Using Pairing Based Cryptography in TOPICS IN CRYPTOLOGY — CT-RSA 2003
  • 1999. Secure Integration of Asymmetric and Symmetric Encryption Schemes in ADVANCES IN CRYPTOLOGY — CRYPTO’ 99
  • 1985. Identity-Based Cryptosystems and Signature Schemes in ADVANCES IN CRYPTOLOGY
  • 2001. Short Signatures from the Weil Pairing in ADVANCES IN CRYPTOLOGY — ASIACRYPT 2001
  • 2002. Hierarchical ID-Based Cryptography in ADVANCES IN CRYPTOLOGY — ASIACRYPT 2002
  • 2002-09-13. Efficient Algorithms for Pairing-Based Cryptosystems in ADVANCES IN CRYPTOLOGY — CRYPTO 2002
  • 2003-02-17. Efficient Identity Based Signature Schemes Based on Pairings in SELECTED AREAS IN CRYPTOGRAPHY
  • 2001-08-02. Identity-Based Encryption from the Weil Pairing in ADVANCES IN CRYPTOLOGY — CRYPTO 2001
  • Book

    TITLE

    Advances in Cryptology - ASIACRYPT 2003

    ISBN

    978-3-540-20592-0
    978-3-540-40061-5

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-3-540-40061-5_29

    DOI

    http://dx.doi.org/10.1007/978-3-540-40061-5_29

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1011459390


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Royal Holloway University of London", 
              "id": "https://www.grid.ac/institutes/grid.4970.a", 
              "name": [
                "Information Security Group, Royal Holloway, University of London, TW20 0EX, Egham, Surrey"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Al-Riyami", 
            "givenName": "Sattam S.", 
            "id": "sg:person.010120457121.47", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010120457121.47"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Royal Holloway University of London", 
              "id": "https://www.grid.ac/institutes/grid.4970.a", 
              "name": [
                "Information Security Group, Royal Holloway, University of London, TW20 0EX, Egham, Surrey"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Paterson", 
            "givenName": "Kenneth G.", 
            "id": "sg:person.0772262700.25", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0772262700.25"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/3-540-36178-2_34", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1003390315", 
              "https://doi.org/10.1007/3-540-36178-2_34"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-46416-6_42", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1006700192", 
              "https://doi.org/10.1007/3-540-46416-6_42"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-46416-6_42", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1006700192", 
              "https://doi.org/10.1007/3-540-46416-6_42"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-36563-x_8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1007876766", 
              "https://doi.org/10.1007/3-540-36563-x_8"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-36563-x_8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1007876766", 
              "https://doi.org/10.1007/3-540-36563-x_8"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-0-387-35256-5_8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1010133122", 
              "https://doi.org/10.1007/978-0-387-35256-5_8"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1016/s1363-4127(02)00306-0", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1011881231"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1016/s1363-4127(02)00306-0", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1011881231"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44647-8_13", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1014375289", 
              "https://doi.org/10.1007/3-540-44647-8_13"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44647-8_13", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1014375289", 
              "https://doi.org/10.1007/3-540-44647-8_13"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-39200-9_17", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1017063415", 
              "https://doi.org/10.1007/3-540-39200-9_17"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-39200-9_17", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1017063415", 
              "https://doi.org/10.1007/3-540-39200-9_17"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-36492-7_20", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1018825050", 
              "https://doi.org/10.1007/3-540-36492-7_20"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-36492-7_20", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1018825050", 
              "https://doi.org/10.1007/3-540-36492-7_20"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/bfb0027937", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1020271655", 
              "https://doi.org/10.1007/bfb0027937"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/bfb0027937", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1020271655", 
              "https://doi.org/10.1007/bfb0027937"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-45682-1_30", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1021295290", 
              "https://doi.org/10.1007/3-540-45682-1_30"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-45708-9_23", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1022469698", 
              "https://doi.org/10.1007/3-540-45708-9_23"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-45708-9_23", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1022469698", 
              "https://doi.org/10.1007/3-540-45708-9_23"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-45811-5_25", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1024054794", 
              "https://doi.org/10.1007/3-540-45811-5_25"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-45811-5_25", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1024054794", 
              "https://doi.org/10.1007/3-540-45811-5_25"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/bfb0055718", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1025880961", 
              "https://doi.org/10.1007/bfb0055718"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-48405-1_34", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1029403937", 
              "https://doi.org/10.1007/3-540-48405-1_34"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-39568-7_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1029422590", 
              "https://doi.org/10.1007/3-540-39568-7_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-45455-1_26", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1033362852", 
              "https://doi.org/10.1007/3-540-45455-1_26"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-46766-1_35", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1038119898", 
              "https://doi.org/10.1007/3-540-46766-1_35"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-46766-1_35", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1038119898", 
              "https://doi.org/10.1007/3-540-46766-1_35"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1049/ecej:20020501", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1056748838"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1049/el:20020387", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1056792067"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/mc.2002.1023787", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061386602"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1137/s0097539701398521", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1062879340"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1137/s0097539795291562", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1062880061"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2003", 
        "datePublishedReg": "2003-01-01", 
        "description": "This paper introduces and makes concrete the concept of certificateless public key cryptography (CL-PKC), a model for the use of public key cryptography which avoids the inherent escrow of identity-based cryptography and yet which does not require certificates to guarantee the authenticity of public keys. The lack of certificates and the presence of an adversary who has access to a master key necessitates the careful development of a new security model. We focus on certificateless public key encryption (CL-PKE), showing that a concrete pairing-based CL-PKE scheme is secure provided that an underlying problem closely related to the Bilinear Diffie-Hellman Problem is hard.", 
        "editor": [
          {
            "familyName": "Laih", 
            "givenName": "Chi-Sung", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-3-540-40061-5_29", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": true, 
        "isPartOf": {
          "isbn": [
            "978-3-540-20592-0", 
            "978-3-540-40061-5"
          ], 
          "name": "Advances in Cryptology - ASIACRYPT 2003", 
          "type": "Book"
        }, 
        "name": "Certificateless Public Key Cryptography", 
        "pagination": "452-473", 
        "productId": [
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1011459390"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-3-540-40061-5_29"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "3698e261d0d81aed88820af048c6ef74b118e4b7f0f9fe06198e1e23a0273ef7"
            ]
          }
        ], 
        "publisher": {
          "location": "Berlin, Heidelberg", 
          "name": "Springer Berlin Heidelberg", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-3-540-40061-5_29", 
          "https://app.dimensions.ai/details/publication/pub.1011459390"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-16T08:20", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000362_0000000362/records_87117_00000000.jsonl", 
        "type": "Chapter", 
        "url": "https://link.springer.com/10.1007%2F978-3-540-40061-5_29"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-40061-5_29'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-40061-5_29'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-40061-5_29'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-40061-5_29'


     

    This table displays all metadata directly associated to this object as RDF triples.

    154 TRIPLES      23 PREDICATES      49 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-3-540-40061-5_29 schema:about anzsrc-for:08
    2 anzsrc-for:0804
    3 schema:author N78a240cf9a26464fabcde37f8c80212f
    4 schema:citation sg:pub.10.1007/3-540-36178-2_34
    5 sg:pub.10.1007/3-540-36492-7_20
    6 sg:pub.10.1007/3-540-36563-x_8
    7 sg:pub.10.1007/3-540-39200-9_17
    8 sg:pub.10.1007/3-540-39568-7_5
    9 sg:pub.10.1007/3-540-44647-8_13
    10 sg:pub.10.1007/3-540-45455-1_26
    11 sg:pub.10.1007/3-540-45682-1_30
    12 sg:pub.10.1007/3-540-45708-9_23
    13 sg:pub.10.1007/3-540-45811-5_25
    14 sg:pub.10.1007/3-540-46416-6_42
    15 sg:pub.10.1007/3-540-46766-1_35
    16 sg:pub.10.1007/3-540-48405-1_34
    17 sg:pub.10.1007/978-0-387-35256-5_8
    18 sg:pub.10.1007/bfb0027937
    19 sg:pub.10.1007/bfb0055718
    20 https://doi.org/10.1016/s1363-4127(02)00306-0
    21 https://doi.org/10.1049/ecej:20020501
    22 https://doi.org/10.1049/el:20020387
    23 https://doi.org/10.1109/mc.2002.1023787
    24 https://doi.org/10.1137/s0097539701398521
    25 https://doi.org/10.1137/s0097539795291562
    26 schema:datePublished 2003
    27 schema:datePublishedReg 2003-01-01
    28 schema:description This paper introduces and makes concrete the concept of certificateless public key cryptography (CL-PKC), a model for the use of public key cryptography which avoids the inherent escrow of identity-based cryptography and yet which does not require certificates to guarantee the authenticity of public keys. The lack of certificates and the presence of an adversary who has access to a master key necessitates the careful development of a new security model. We focus on certificateless public key encryption (CL-PKE), showing that a concrete pairing-based CL-PKE scheme is secure provided that an underlying problem closely related to the Bilinear Diffie-Hellman Problem is hard.
    29 schema:editor Nbf15123d8cb0483aa6b17db399fec523
    30 schema:genre chapter
    31 schema:inLanguage en
    32 schema:isAccessibleForFree true
    33 schema:isPartOf Nd4f5e449e5e24e18aab5bd7ff8788e88
    34 schema:name Certificateless Public Key Cryptography
    35 schema:pagination 452-473
    36 schema:productId N0ee0bc32ad154076877ee9ffa2459585
    37 N714d5e01f8294b6c8c5b2b35a6c33e3f
    38 Ne87bfc6f30734a8ebc02895cfa588fa7
    39 schema:publisher N685275545566414098b6025ebcca8984
    40 schema:sameAs https://app.dimensions.ai/details/publication/pub.1011459390
    41 https://doi.org/10.1007/978-3-540-40061-5_29
    42 schema:sdDatePublished 2019-04-16T08:20
    43 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    44 schema:sdPublisher N06151f030d034e96a4196d9cce151991
    45 schema:url https://link.springer.com/10.1007%2F978-3-540-40061-5_29
    46 sgo:license sg:explorer/license/
    47 sgo:sdDataset chapters
    48 rdf:type schema:Chapter
    49 N06151f030d034e96a4196d9cce151991 schema:name Springer Nature - SN SciGraph project
    50 rdf:type schema:Organization
    51 N0ee0bc32ad154076877ee9ffa2459585 schema:name doi
    52 schema:value 10.1007/978-3-540-40061-5_29
    53 rdf:type schema:PropertyValue
    54 N641ab28ad95f4c9ca55458b0bce39623 rdf:first sg:person.0772262700.25
    55 rdf:rest rdf:nil
    56 N685275545566414098b6025ebcca8984 schema:location Berlin, Heidelberg
    57 schema:name Springer Berlin Heidelberg
    58 rdf:type schema:Organisation
    59 N714d5e01f8294b6c8c5b2b35a6c33e3f schema:name dimensions_id
    60 schema:value pub.1011459390
    61 rdf:type schema:PropertyValue
    62 N78a240cf9a26464fabcde37f8c80212f rdf:first sg:person.010120457121.47
    63 rdf:rest N641ab28ad95f4c9ca55458b0bce39623
    64 Na877b80e899c44c7be5d4f9ee9b7068b schema:familyName Laih
    65 schema:givenName Chi-Sung
    66 rdf:type schema:Person
    67 Nbf15123d8cb0483aa6b17db399fec523 rdf:first Na877b80e899c44c7be5d4f9ee9b7068b
    68 rdf:rest rdf:nil
    69 Nd4f5e449e5e24e18aab5bd7ff8788e88 schema:isbn 978-3-540-20592-0
    70 978-3-540-40061-5
    71 schema:name Advances in Cryptology - ASIACRYPT 2003
    72 rdf:type schema:Book
    73 Ne87bfc6f30734a8ebc02895cfa588fa7 schema:name readcube_id
    74 schema:value 3698e261d0d81aed88820af048c6ef74b118e4b7f0f9fe06198e1e23a0273ef7
    75 rdf:type schema:PropertyValue
    76 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    77 schema:name Information and Computing Sciences
    78 rdf:type schema:DefinedTerm
    79 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    80 schema:name Data Format
    81 rdf:type schema:DefinedTerm
    82 sg:person.010120457121.47 schema:affiliation https://www.grid.ac/institutes/grid.4970.a
    83 schema:familyName Al-Riyami
    84 schema:givenName Sattam S.
    85 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010120457121.47
    86 rdf:type schema:Person
    87 sg:person.0772262700.25 schema:affiliation https://www.grid.ac/institutes/grid.4970.a
    88 schema:familyName Paterson
    89 schema:givenName Kenneth G.
    90 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0772262700.25
    91 rdf:type schema:Person
    92 sg:pub.10.1007/3-540-36178-2_34 schema:sameAs https://app.dimensions.ai/details/publication/pub.1003390315
    93 https://doi.org/10.1007/3-540-36178-2_34
    94 rdf:type schema:CreativeWork
    95 sg:pub.10.1007/3-540-36492-7_20 schema:sameAs https://app.dimensions.ai/details/publication/pub.1018825050
    96 https://doi.org/10.1007/3-540-36492-7_20
    97 rdf:type schema:CreativeWork
    98 sg:pub.10.1007/3-540-36563-x_8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1007876766
    99 https://doi.org/10.1007/3-540-36563-x_8
    100 rdf:type schema:CreativeWork
    101 sg:pub.10.1007/3-540-39200-9_17 schema:sameAs https://app.dimensions.ai/details/publication/pub.1017063415
    102 https://doi.org/10.1007/3-540-39200-9_17
    103 rdf:type schema:CreativeWork
    104 sg:pub.10.1007/3-540-39568-7_5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029422590
    105 https://doi.org/10.1007/3-540-39568-7_5
    106 rdf:type schema:CreativeWork
    107 sg:pub.10.1007/3-540-44647-8_13 schema:sameAs https://app.dimensions.ai/details/publication/pub.1014375289
    108 https://doi.org/10.1007/3-540-44647-8_13
    109 rdf:type schema:CreativeWork
    110 sg:pub.10.1007/3-540-45455-1_26 schema:sameAs https://app.dimensions.ai/details/publication/pub.1033362852
    111 https://doi.org/10.1007/3-540-45455-1_26
    112 rdf:type schema:CreativeWork
    113 sg:pub.10.1007/3-540-45682-1_30 schema:sameAs https://app.dimensions.ai/details/publication/pub.1021295290
    114 https://doi.org/10.1007/3-540-45682-1_30
    115 rdf:type schema:CreativeWork
    116 sg:pub.10.1007/3-540-45708-9_23 schema:sameAs https://app.dimensions.ai/details/publication/pub.1022469698
    117 https://doi.org/10.1007/3-540-45708-9_23
    118 rdf:type schema:CreativeWork
    119 sg:pub.10.1007/3-540-45811-5_25 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024054794
    120 https://doi.org/10.1007/3-540-45811-5_25
    121 rdf:type schema:CreativeWork
    122 sg:pub.10.1007/3-540-46416-6_42 schema:sameAs https://app.dimensions.ai/details/publication/pub.1006700192
    123 https://doi.org/10.1007/3-540-46416-6_42
    124 rdf:type schema:CreativeWork
    125 sg:pub.10.1007/3-540-46766-1_35 schema:sameAs https://app.dimensions.ai/details/publication/pub.1038119898
    126 https://doi.org/10.1007/3-540-46766-1_35
    127 rdf:type schema:CreativeWork
    128 sg:pub.10.1007/3-540-48405-1_34 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029403937
    129 https://doi.org/10.1007/3-540-48405-1_34
    130 rdf:type schema:CreativeWork
    131 sg:pub.10.1007/978-0-387-35256-5_8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1010133122
    132 https://doi.org/10.1007/978-0-387-35256-5_8
    133 rdf:type schema:CreativeWork
    134 sg:pub.10.1007/bfb0027937 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020271655
    135 https://doi.org/10.1007/bfb0027937
    136 rdf:type schema:CreativeWork
    137 sg:pub.10.1007/bfb0055718 schema:sameAs https://app.dimensions.ai/details/publication/pub.1025880961
    138 https://doi.org/10.1007/bfb0055718
    139 rdf:type schema:CreativeWork
    140 https://doi.org/10.1016/s1363-4127(02)00306-0 schema:sameAs https://app.dimensions.ai/details/publication/pub.1011881231
    141 rdf:type schema:CreativeWork
    142 https://doi.org/10.1049/ecej:20020501 schema:sameAs https://app.dimensions.ai/details/publication/pub.1056748838
    143 rdf:type schema:CreativeWork
    144 https://doi.org/10.1049/el:20020387 schema:sameAs https://app.dimensions.ai/details/publication/pub.1056792067
    145 rdf:type schema:CreativeWork
    146 https://doi.org/10.1109/mc.2002.1023787 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061386602
    147 rdf:type schema:CreativeWork
    148 https://doi.org/10.1137/s0097539701398521 schema:sameAs https://app.dimensions.ai/details/publication/pub.1062879340
    149 rdf:type schema:CreativeWork
    150 https://doi.org/10.1137/s0097539795291562 schema:sameAs https://app.dimensions.ai/details/publication/pub.1062880061
    151 rdf:type schema:CreativeWork
    152 https://www.grid.ac/institutes/grid.4970.a schema:alternateName Royal Holloway University of London
    153 schema:name Information Security Group, Royal Holloway, University of London, TW20 0EX, Egham, Surrey
    154 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...