1 |
F. Hess, "Efficient identity based signature schemes based on pairings," Proc. Selected Areas in Cryptography - SAC'02, Lecture Notes in Computer Science, Vol.2595, pp. 310-324, 2002
|
2 |
L. Perlman, V. Welch, I. Foster, C. Kesselman and S. Tuecke, "Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile," RFC 3820, 2004
|
3 |
V. Welch, I. Foster, C. Kesselman, O. Mulmo, L. Peralman, S. Tuecke, J. Gawor, S. Meder and F. Siebenlist, "X.509 Proxy Certificates for Dynamic Delegation," Proc. 3rd Annual PKI Workshop, 2003
|
4 |
K. Paterson, "ID-based signatures from pairings on elliptic curves," Electronics Letters, Vol.38, No.18, pp. 1025-1026, 2002
DOI
ScienceOn
|
5 |
Y. Kawahara, T. Takagi, E. Okamoto, "Efficient Implementation of Tate Pairing on Mobile Phone using Java," International Conferences on Computational Intelligence and Security, CIS 2006, pp. 1247-1251
|
6 |
A. Shamir, "Identity-based cryptosystems and signature schemes," Proc. of Crypto'84, Lecture Notes in Computer Science, Vol. 196, pp. 47-53, 1985
|
7 |
Globus project, http://www.globus.org
|
8 |
R. P. Brent, "Recent Progress and Prospects for Integer Factorisation Algorithms," Computing and Combinatorics: 6th Annual International Conference - COCOOON 2000, LNCS, Vol.1858, pp. 3-22, 2000
|
9 |
The Globus Alliance Website, http://www.globus. org/toolkit/downloads/4.0.5/#source
|
10 |
I. Foster, C. Kesselman, and S. Tuecke, "The Anatomy of the Grid: Enabling Scalable Virtual Organizations," The international journal of high performance computing applications, Vol.15, No.3, pp. 200-222, 2001
DOI
ScienceOn
|
11 |
PBC Library (The Pairing-based Cryptography Library) http://crypto.stanford.edu/pbc
|
12 |
C. Cha and J. Cheon, "An identity-based signature from gap Diffie-Hellman groups," Proc. Public Key Cryptography - PKC 2003, Lecture Notes in Computer Science, Vol.2139, pp. 18-30, 2003. 11
|
13 |
I. Foster, C. Kesselman, G. Tsudik and S. Tuecke, "A Security Architecture for Computational Grids," Proc. 5th ACM Conference on Computers and Communications Security, pp. 83-91, 1998
|
14 |
B. Neuman, "Proxy-based authorization and accounting for distributed systems," Proc. 13th International Conference of Distributed Computing Systems, pp. 283-291, 1993
|
15 |
Teraflops Research Chip. http://techresearch.intel.com/ articles/Tera-Scale/1449.htm
|