Certificate-Based Encryption Scheme with General Access Structure, CISIM 2012, pp.41-55, 2012. ,
DOI : 10.1007/978-3-642-33260-9_3
A Secret Sharing Scheme with General Access Structures and its Applications, International Journal of Advancements in Computing Technology, vol.3, issue.4, pp.121-128, 2011. ,
Identity-Based Cryptosystems and Signature Schemes, CRYPTO, pp.47-53, 1984. ,
DOI : 10.1007/3-540-39568-7_5
Identity-Based Encryption from the Weil Pairing, Lecture Notes in Computer Science, vol.2139, pp.213-229, 2001. ,
DOI : 10.1007/3-540-44647-8_13
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.21.3708
Identity-Based Encryption, 2011. ,
DOI : 10.1007/978-1-4419-9383-0
Pairings for cryptographers, Discrete Applied Mathematics, vol.156, issue.16, pp.3113-3121, 2008. ,
DOI : 10.1016/j.dam.2007.12.010
URL : http://doi.org/10.1016/j.dam.2007.12.010
Certificateless Public Key Cryptography, Advances in Cryptology -AsiaCrypt, pp.452-473, 2003. ,
DOI : 10.1007/978-3-540-40061-5_29
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.6.8328
Generic Constructions of Identity-Based and Certificateless KEMs, Journal of Cryptology, vol.33, issue.2, pp.178-199, 2008. ,
DOI : 10.1007/s00145-007-9000-z
Parallelization of the Discrete Chaotic Block Encryption Algorithm, Proceedings of the 9th International Conference on Parallel Processing and Applied Mathematics, PPAM 2011, pp.323-332, 2012. ,
DOI : 10.1007/978-3-642-31500-8_33
Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack, SIAM Journal on Computing, vol.33, issue.1, pp.167-226, 2004. ,
DOI : 10.1137/S0097539702403773
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.23.9833
Service-Oriented Modeling (SOA): Service Analysis, Design, and Architecture, 2008. ,
PBC Library Specification, 2013. ,
K: Security Configuration Checklist Program for IT Products -Guidance for Checklist Users and Developers, NIST Special Publication SP, pp.800-70, 2005. ,
DOI : 10.6028/NIST.SP.800-70
Short Signatures from the Weil Pairing, ASIACRYPT, pp.514-532, 2001. ,
DOI : 10.1007/3-540-45682-1_30
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.1494
Identity-Based Encryption Architecture and Supporting Data Structures, 2009. ,
DOI : 10.17487/rfc5408
Aggregate and verifiably encrypted signatures from bilinear maps, advances in cryptology ? Eurocrypt'03, Lecture Notes in Computer Science, vol.2656, pp.614-629, 2003. ,
DOI : 10.1007/3-540-39200-9_26
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.459
Hierarchical ID-Based Cryptography, Advances in Cryptology ? ASIACRYPT 2002, pp.548-566, 2002. ,
DOI : 10.1007/3-540-36178-2_34
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.16.7270
A New Mathematical Model for Analytical Risk Assessment and Prediction in IT Systems, Control and Cybernetics, vol.41, issue.1, pp.241-268, 2012. ,
A Comparative Study of Risk Assessment Methods, MEHARI & CRAMM with a New Formal Model of Risk Assessment (FoMRA) in Information Systems, CISIM 2012, pp.428-442, 2012. ,
Long-term preservation of digital signatures for multiple groups of related documents, IET Information Security, vol.6, issue.3, pp.219-227, 2012. ,
DOI : 10.1049/iet-ifs.2011.0344