Conferences related to Identity-based encryption

Back to Top

2020 International Symposium on Information Theory and Its Applications (ISITA)

The scope of the symposium includes all aspects of information theory and its applications. Itcovers a wide range of topics such as Shannon Theory, Coding Theory, and InformationSecurity as well as novel applications of information theory.

  • 2018 International Symposium on Information Theory and Its Applications (ISITA)

    The scope of the symposium includes all aspects of information theory and its applications. It covers a wide range of topics such as Shannon Theory, Coding Theory, and Information Security as well as novel applications of information theory.

  • 2016 International Symposium on Information Theory and Its Applications (ISITA)

    The scope of the symposium includes all aspects of information theory and its applications. It covers a wide range of topics such as Shannon Theory, Coding Theory, and Information Security as well as novel applications of information theory.

  • 2014 International Symposium on Information Theory and its Applications (ISITA)

    The ISITA symposium features world-class speakers, plenary talks and technical sessions on a diverse range of topics within the field of information theory Interested authors are invited to submit papers describing novel and previously unpublished results on topics in information theory and its applications, including, but not limited to: Error Control Coding, Coded Modulation, Communication Systems, Detection and EstimationSpread Spectrum Systems, Signal Processing, Rate-Distortion Theory, Stochastic Processes, Network Coding, Shannon Theory, Coding Theory and Practice, Data Compression and Source Coding, Data Storage, Mobile Communications, Pattern Recognition and Learning, Speech/Image Coding, Multi-Terminal Information Theory, Cryptography and Data Security, Applications of Information Theory, and Quantum Information Theory.

  • 2012 International Symposium on Information Theory and its Applications (ISITA)

    The scope of this symposium includes all aspects of information theory and its applications. It covers a wide range of topics such as Shannon Theory, Coding Theory, and Cryptology as well as novel applications of Information Theory.

  • 2010 International Symposium On Information Theory & Its Applications (Isita2010)

    The topics of interest include Error Control Coding, Coding Theory and Practice, Coded Modulation, Data Compression and Source Coding, Pattern Recognition and Learning, Speech/Image Coding, Rate-Distortion Theory, Shannon Theory, Stochastic Processes, Cryptology and Data Security, Data Networks, Multi-User Information Theory, Quantum Information Processing

  • 2008 International Symposium on Information Theory and its Applications (ISITA)

    The scope is Information theory and its Applications, e.g., error control coding, Coded Modulation, Cummunication systems, Detection and estimation, Spread spectrum systems, Signal processing, Rate-distortion theory, Stochastic processes, Data networks, Multi-user information theory, Coding theory and Practice, Data compression and Source coding, Optical communications, Mobile communications, Pattern recognition and learning, Speech/Image Coding, Shannon Theory, Cryptograph and Data Securi


GLOBECOM 2020 - 2020 IEEE Global Communications Conference

IEEE Global Communications Conference (GLOBECOM) is one of the IEEE Communications Society’s two flagship conferences dedicated to driving innovation in nearly every aspect of communications. Each year, more than 2,900 scientific researchers and their management submit proposals for program sessions to be held at the annual conference. After extensive peer review, the best of the proposals are selected for the conference program, which includes technical papers, tutorials, workshops and industry sessions designed specifically to advance technologies, systems and infrastructure that are continuing to reshape the world and provide all users with access to an unprecedented spectrum of high-speed, seamless and cost-effective global telecommunications services.


ICC 2020 - 2020 IEEE International Conference on Communications

All topics relating to existing and emerging communications networking technologies.


2019 11th International Conference on Computational Intelligence and Communication Networks (CICN)

11th International Conference on Computational Intelligence and Communication Networks (CICN 2017) is organized to address various issues to support intelligentsolutions for society. The aim is to bring together worldwide leading researchers, developers, practitioners and educators interested in advancing the state of the art in computational intelligence and communication networks with the goal of exchanging knowledge that encompasses a broad range of disciplines among various distinct communities. It is expected that researchers will enhance collaboration across disciplines in order to support novel breakthroughs in the field.

  • 2018 10th International Conference on Computational Intelligence and Communication Networks (CICN)

    10th International Conference on Computational Intelligence and Communication Networks (CICN 2017) is organized to address various issues to prosper the creation of intelligent solutions in future. The aim is to bring together worldwide leading researchers, developers, practitioners and educators interested in advancing the state of the art in computational intelligence and communication Networks for exchanging knowledge that encompasses a broad range of disciplines among various distinct communities. It is expected that researchers will bring new prospect for collaboration across disciplines and gain idea facilitating novel breakthrough. The theme for this conference is Innovating and Inspiring the researchers to adopt the outcome for implementation.

  • 2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)

    Soft computing, Fuzzy Logic and ANN • Sensors and networks (wireless ad hoc N/W, Vehicular N/W) • Acoustic and under water electronics/communication and sonar systems • Image, Signal and Speach Processing • Microwave IC, antennas and Wave Propagation • Modeling and simulation• Digital Design, VLSI and SOC • Data Mining, Big data, Ontology and Web Services • Parallel and distributed systems• Telecommunication and Mobile communication • Grid, Cloud, High Speed/Performance and Green Computing • RFIDs and applicatons• Embedded systems and Hardware Design/Implementation • Mobile Computing, Computational Intelligence • Power Electronics, Transmission and Power Systems • Computer Vision and Artificial Intelligence • Bio-informatics, Biometry and Medical Imaging• Information security,Network Security and Steganography • Remote sensing and GIS

  • 2016 8th International Conference on Computational Intelligence and Communication Networks (CICN)

    Soft computing, Fuzzy Logic and ANN ? Sensors and networks (wireless ad hoc N/W, Vehicular N/W) ? Acoustic and under water electronics/communication and sonar systems ? Signal and Speach Processing ? Microwave IC, antennas and Wave Propagation ? Modeling and simulation ? VLSI Design and SOC ? Data Mining, Ontology and Web Services ? Parallel and distributed systems ? Telecommunication and Mobile communication ? Grid, Cloud, High Speed/Performance and Green Computing ? RFIDs and applicatons ? Embedded systems and Hardware Design/Implementation ? Mobile Computing, Computational Intelligence

  • 2015 International Conference on Computational Intelligence and Communication Networks (CICN)

    Soft computing, Fuzzy Logic and ANN • Sensors and networks (wireless ad hoc N/W, Vehicular N/W) • Acoustic and under water electronics/communication and sonar systems • Signal and Speach Processing • Microwave IC, antennas and Wave Propagation • Modeling and simulation• VLSI Design and SOC • Data Mining, Ontology and Web Services • Parallel and distributed systems• Telecommunication and Mobile communication • Grid, Cloud, High Speed/Performance and Green Computing • RFIDs and applicatons• Embedded systems and Hardware Design/Implementation • Mobile Computing, Computational Intelligence

  • 2014 International Conference on Computational Intelligence and Communication Networks (CICN)

    The International Conference on Computational Intelligence and Communication Networks (CICN 2014) is organized to address various issues to prosper the creation of intelligent solutions in future. The aim is to bring together worldwide leading researchers, developers, practitioners and educators interested in advancing the state of the art in computational intelligence and communication Networks for exchanging knowledge that encompasses a broad range of disciplines among various distinct communities. It is expected that researchers will bring new prospect for collaboration across disciplines and gain idea facilitating novel breakthrough. The theme for this conference is Innovating and Inspiring the researchers to adopt the outcome for implementation. The conference will provide an exceptional platform to the researchers to meet and discuss the utmost solutions, scientific results and methods in solving intriguing problems with people that actively involved in these evergreen fields. T

  • 2013 5th International Conference on Computational Intelligence and Communication Networks (CICN)

    Topics

  • 2012 4th International Conference on Computational Intelligence and Communication Networks (CICN)

    The lnternational Conference CICN 2012 aims to bring together researchers, engineers, developers and practitioners from academia and industry working in all major areas and interdisciplinary to brainstorm for fruitful results and applications.

  • 2011 International Conference on Computational Intelligence and Communication Networks (CICN)

    The International Conference on Computational Intelligence and Communication Networks (CICN2011) is organized to address various issues to prosper the creation of intelligent solutions in future. The aim is to bring together worldwide leading researchers, developers, practitioners and educators interested in advancing the state of the art in computational intelligence and communication Networks for exchanging knowledge that encompasses a broad range of disciplines among various distinct communities.

  • 2010 International Conference on Computational Intelligence and Communication Networks (CICN)

    The International Conference on Computational Intelligence and Communication Networks (CICN2010) is organized to address various issues to prosper the creation of intelligent solutions in future. The aim is to bring together worldwide leading researchers, developers, practitioners and educators interested in advancing the state of the art in computational intelligence and communication Networks for exchanging knowledge that encompasses a broad range of disciplines among various distinct communities.


2019 14th IEEE Conference on Industrial Electronics and Applications (ICIEA)

Artificial Intelligence, Control and Systems, Cyber-physical Systems, Energy and Environment, Industrial Informatics and Computational Intelligence, Robotics, Network and Communication Technologies, Power Electronics, Signal and Information Processing


More Conferences

Periodicals related to Identity-based encryption

Back to Top

Applied Superconductivity, IEEE Transactions on

Contains articles on the applications and other relevant technology. Electronic applications include analog and digital circuits employing thin films and active devices such as Josephson junctions. Power applications include magnet design as well asmotors, generators, and power transmission


Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Broadcasting, IEEE Transactions on

Broadcast technology, including devices, equipment, techniques, and systems related to broadcast technology, including the production, distribution, transmission, and propagation aspects.


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


More Periodicals

Most published Xplore authors for Identity-based encryption

Back to Top

No authors for "Identity-based encryption"


Xplore Articles related to Identity-based encryption

Back to Top

IEEE Draft Standard for Identity-Based Cryptographic Techniques using Pairings

IEEE P1363/D6, December 2011, 2011

This standard specifies common identity-based public-key cryptographic techniques that use pairings, including mathematical primitives for secret value (key) derivation, public-key encryption, and digital signatures, and cryptographic schemes based on those primitives. It also specifies related cryptographic parameters, public keys and private keys. The purpose of this standard is to provide a reference for specifications of a variety of techniques from ...


Low field cold iron SC magnet technology: new aspects of application

IEEE Transactions on Applied Superconductivity, 2000

The results of the development of 2 T cold iron SC-magnet technology at the Laboratory of High Energies, JINR including a Nuclotron-type SC booster and a VLHC cryomagnetic assembly design are presented. New experimental data on the Nuclotron magnet system operation are discussed.


Adding real-time filters to object-oriented specification of time critical systems

Proceedings. 2nd IEEE Workshop on Industrial Strength Formal Specification Techniques, 1998

We describe Real-Time Object-Z (RTOZ), a language with real-time extensions to Object-Z, and describe informally its semantics. The novelty of our approach lies in the minimal set of syntactic extensions to Object-Z and in the introduction of real-time filters for the separation of real time constraints from the functional specification of objects. Both the functional specification and filter specification for ...


Method of Detecting the Sybil Attack Based on Ranging in Wireless Sensor Network

2009 5th International Conference on Wireless Communications, Networking and Mobile Computing, 2009

Method of detecting the Sybil attack based on ranging is proposed in this paper. Every node finds out the suspect nodes by checking the neighbor nodes range. The neighbor nodes exchange the information and find out Sybil node. As a result, the method has costs less, no use for high accurate range, but it has extremely precise. It is particularly ...


Novel approach to secure broadcast in distributed systems

Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology, 1995

We present a scheme for secure broadcasting confidential data messages in distributed system or networking environments. The scheme is based on the theory of linear block codes and does not make use of any encryption algorithms. In addition, we show how to achieve reliable message transmission in the presence of channel errors by sending an error correcting parity message in ...


More Xplore Articles

Educational Resources on Identity-based encryption

Back to Top

IEEE.tv Videos

IEEE @ SXSW 2015 - Future of Identity Series Overview
Optical Stealth Communication based on Amplified Spontaneous Emission Noise - Ben Wu - IEEE Sarnoff Symposium, 2019
John S. Baras accepts the IEEE Simon Ramo Medal - Honors Ceremony 2017
Array Transversing through strings
Computer: Alan Turing at Bletchley Park
Ted Tours the Brooklyn 5G Summit Expo Floor
IEEE @ SXSW 2015 - IEEE Future of Identity Official SXSW Party
David Kravitz: Blockchain-Compatible Identity and Access Management for IoT - Special Session on SIoT: WF-IoT 2016
Panelist Shahar Belkin - ETAP Forum Tel Aviv 2016
Adventures in Usable Privacy and Security: From Empirical Studies to Public Policy - IEEE SecDev 2016
IEEE @ SXSW 2015 - Biometrics & Identity: Beyond Wearable
NIKSUN World Wide Security & Mobility Conference 2011-B Lyons
Q&A: David Kravitz - Special Session on SIoT: WF-IoT 2016
IEEE World Forum on Internet of Things - Milan, Italy - Sara Foresti - Data Security and Privacy in the Internet of Things - Part 2
Single Frame Super Resolution: Fuzzy Rule-Based and Gaussian Mixture Regression Approaches
"Do you trust me?" vs "Can I trust you?" Root of Trust Within My Connected Symbiotic Autonomous Systems - John Budenske
Energy Efficient Single Flux Quantum Based Neuromorphic Computing - IEEE Rebooting Computing 2017
Network. Collaborate. Create.
IEEE @ SXSW 2015 - A Framework for Privacy by Design
Using Computational Intelligence to automate Craniofacial Superimposition for Skeleton-based Human Identification

IEEE-USA E-Books

  • IEEE Draft Standard for Identity-Based Cryptographic Techniques using Pairings

    This standard specifies common identity-based public-key cryptographic techniques that use pairings, including mathematical primitives for secret value (key) derivation, public-key encryption, and digital signatures, and cryptographic schemes based on those primitives. It also specifies related cryptographic parameters, public keys and private keys. The purpose of this standard is to provide a reference for specifications of a variety of techniques from which applications may select.

  • Low field cold iron SC magnet technology: new aspects of application

    The results of the development of 2 T cold iron SC-magnet technology at the Laboratory of High Energies, JINR including a Nuclotron-type SC booster and a VLHC cryomagnetic assembly design are presented. New experimental data on the Nuclotron magnet system operation are discussed.

  • Adding real-time filters to object-oriented specification of time critical systems

    We describe Real-Time Object-Z (RTOZ), a language with real-time extensions to Object-Z, and describe informally its semantics. The novelty of our approach lies in the minimal set of syntactic extensions to Object-Z and in the introduction of real-time filters for the separation of real time constraints from the functional specification of objects. Both the functional specification and filter specification for any time critical system can be developed using the syntax of RTOZ. The semantics of RTOZ provides a consistent mapping between the classes in an Object-Z specification and their corresponding real-time constraints. We illustrate the expressive power of RTOZ with a case study.

  • Method of Detecting the Sybil Attack Based on Ranging in Wireless Sensor Network

    Method of detecting the Sybil attack based on ranging is proposed in this paper. Every node finds out the suspect nodes by checking the neighbor nodes range. The neighbor nodes exchange the information and find out Sybil node. As a result, the method has costs less, no use for high accurate range, but it has extremely precise. It is particularly suitable for the low-cost, lacking resources of wireless sensor network.

  • Novel approach to secure broadcast in distributed systems

    We present a scheme for secure broadcasting confidential data messages in distributed system or networking environments. The scheme is based on the theory of linear block codes and does not make use of any encryption algorithms. In addition, we show how to achieve reliable message transmission in the presence of channel errors by sending an error correcting parity message in the secure broadcast scheme.

  • Safe Path Network: A New Approach To Path-planning

    This paper describes a new method to solve the path-planning problem. This method generates a network named Safe Path Network ( SPN for short ) for a known polygonal environment.The nodes of the SPN are the minimal safe areas In which moving object can turn around without collision. The arcs of the network are connections between these nodes with information to navigate safe motion Of the object either along straight or curve path. Actually,SPN is motivated by the VGRAPH [2]. Having established the SPN,the path-planning problem taking account of the shape and orientation of a moving object becomes a network searching problem.This method can solve many difficult path-planning problems with lower computational complexity.

  • Adlets migration and handling in a distributed object environment

    Large distributed systems may contain millions of objects that have to be managed. This makes it impossible to specify management policies for individual objects. Instead it is necessary to specify policy for groups of objects. This paper describes a framework for the construction of the ADlets Distributed Migration Mechanism (ADDMM), which is used by the Adlet System for the management of adlets. The Adlet System is a new approach for multimedia information retrieval and fusion based on the concept of active document advertising, whereby an adlet (the metadata of a document) travels in the network to seek out documents of interest to the parent document, and at the same time advertises its parent document to other interested adlets. ADDMM provides the Adlet System with the facility of managing migrating adlets. ADDMM supports location-independent transparency and minimal interface by utilizing the ADDNS naming system that provides a mechanism for transparent naming and locating adlets, which in turn supports ADDMM transparency at the adlet access level. With the ADDMM migration mechanism, various adlet migration protocols can be constructed and deployed. A visual diagram is introduced to specify such protocols for adlets migration, which can also be employed to specify distributed object management policies.

  • Prediction and adaptation in Active Harmony

    We describe the design and early functionality of the Active Harmony global resource management system. Harmony is an infrastructure designed to efficiently execute parallel applications in large scale, dynamic environments. Harmony differs from other projects with similar goals in that the system automatically adapts ongoing computations to changing conditions through online reconfiguration. This reconfiguration can consist of system directed migration of work at several different levels, or automatic application adaptation through the use of tuning options exported by Harmony aware applications. We describe early experience with work migration at the level of procedures, processes and lightweight threads.

  • /spl rho/: hierarchical modeling of parallel architectures

    Although there exist many approaches for classification of computer architectures, no system is able to distinguish parallel computers adequately yet. The first part of this paper is a brief survey of the main characteristics of various parallel architecture concepts and several approaches of classification. We realized that the idea of defining a sharp classification system is questionable in the world of parallel computing. But we also recognized important structural similarities of computing systems. So we introduce a modeling system, called /spl rho/ (recursive hierarchical objects), which allows to describe the structure of various computing systems hierarchically However, we do not aim at a new classification system but at a scheme for modeling parallel architectures.

  • The compatibility of strong automation of comparative LCA with the broad possibility of creative decisions in a new tool for analysis of similar products concerning environmental consequence

    Based on a new method of calculation, the software "Oeko-Bar for the comparative analysis of different design solutions of the same product or for analysis of similar products" is in development at the Swiss Federal Institute of Technology, Zurich. This contribution describes the solutions used in "Oeko-Bar" to ensure a high degree of automation of the analysis and at the same time to enhance the level of flexibility and adaptability of the software for the analysis of the great diversity of industrial equipment.



Standards related to Identity-based encryption

Back to Top

No standards are currently tagged "Identity-based encryption"


Jobs related to Identity-based encryption

Back to Top