000812460 000__ 02891cam\a2200529Ii\4500 000812460 001__ 812460 000812460 005__ 20210515142537.0 000812460 006__ m\\\\\o\\d\\\\\\\\ 000812460 007__ cr\cn\nnnunnun 000812460 008__ 180426t20172017flua\\\\ob\\\\001\0\eng\d 000812460 019__ $$a959274518$$a959868312 000812460 020__ $$a9781315355399$$q(electronic book) 000812460 020__ $$a1315355396$$q(electronic book) 000812460 020__ $$z9781482248609 000812460 020__ $$z1482248603 000812460 035__ $$a(OCoLC)ocn959278001 000812460 035__ $$a(OCoLC)959278001$$z(OCoLC)959274518$$z(OCoLC)959868312 000812460 035__ $$a812460 000812460 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dN$T$$dYDX$$dIDEBK$$dCOO$$dCRCPR$$dWAU$$dOCLCF$$dOCLCQ$$dUPM$$dCSAIL 000812460 049__ $$aISEA 000812460 050_4 $$aQA76.9.A25$$bX75 2017eb 000812460 08204 $$a005.8/2$$223 000812460 1001_ $$aXiong, Hu,$$eauthor. 000812460 24510 $$aIntroduction to certificateless cryptography /$$cHu Xiong, Zhen Qin, and Athanasios V. Vasilakos. 000812460 264_1 $$aBoca Raton :$$bCRC Press, Taylor & Francis Group,$$c[2017] 000812460 264_4 $$c©2017 000812460 300__ $$a1 online resource :$$billustrations 000812460 336__ $$atext$$btxt$$2rdacontent 000812460 337__ $$acomputer$$bc$$2rdamedia 000812460 338__ $$aonline resource$$bcr$$2rdacarrier 000812460 504__ $$aIncludes bibliographical references and index. 000812460 5050_ $$aSection I. Setting the stage -- Section II. CL-PKC without random oracles -- Section III. CL-PKC in random oracle models -- Section IV. Applications, extensions, and related paradigms -- Section V. Future directions. 000812460 506__ $$aAccess limited to authorized users. 000812460 520__ $$a"As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications have been proposed during the last decade. Differing from the other books on the market, this one provides rigorous treatment of CL-PKC. Definitions, precise assumptions, and rigorous proofs of security are provided in a manner that makes them easy to understand"--Provided by publisher. 000812460 588__ $$aDescription based on print version record. 000812460 650_0 $$aPublic key infrastructure (Computer security) 000812460 650_0 $$aPublic key cryptography. 000812460 650_0 $$aIdentification. 000812460 650_0 $$aData encryption (Computer science) 000812460 650_0 $$aComputer networks$$xSecurity measures. 000812460 7001_ $$aQin, Zhen,$$d1982-$$eauthor. 000812460 7001_ $$aVasilakos, Athanasios,$$eauthor. 000812460 77608 $$iPrint version:$$aXiong, Hu.$$tIntroduction to certificateless cryptography.$$dBoca Raton : CRC Press, Taylor & Francis Group, [2017]$$z9781482248609$$w(DLC) 2016016910$$w(OCoLC)895728647 000812460 852__ $$bacq 000812460 85280 $$bebk$$hEBSCOhost 000812460 85640 $$3eBooks on EBSCOhost$$uhttps://univsouthin.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1357343$$zOnline Access 000812460 909CO $$ooai:library.usi.edu:812460$$pGLOBAL_SET 000812460 980__ $$aEBOOK 000812460 980__ $$aBIB 000812460 982__ $$aEbook 000812460 983__ $$aOnline 000812460 994__ $$a92$$bISE