Conferences related to Identity-based encryption

Back to Top

GLOBECOM 2020 - 2020 IEEE Global Communications Conference

IEEE Global Communications Conference (GLOBECOM) is one of the IEEE Communications Society’s two flagship conferences dedicated to driving innovation in nearly every aspect of communications. Each year, more than 2,900 scientific researchers and their management submit proposals for program sessions to be held at the annual conference. After extensive peer review, the best of the proposals are selected for the conference program, which includes technical papers, tutorials, workshops and industry sessions designed specifically to advance technologies, systems and infrastructure that are continuing to reshape the world and provide all users with access to an unprecedented spectrum of high-speed, seamless and cost-effective global telecommunications services.


2020 International Symposium on Information Theory and Its Applications (ISITA)

The scope of the symposium includes all aspects of information theory and its applications. Itcovers a wide range of topics such as Shannon Theory, Coding Theory, and InformationSecurity as well as novel applications of information theory.

  • 2008 International Symposium on Information Theory and its Applications (ISITA)

    The scope is Information theory and its Applications, e.g., error control coding, Coded Modulation, Cummunication systems, Detection and estimation, Spread spectrum systems, Signal processing, Rate-distortion theory, Stochastic processes, Data networks, Multi-user information theory, Coding theory and Practice, Data compression and Source coding, Optical communications, Mobile communications, Pattern recognition and learning, Speech/Image Coding, Shannon Theory, Cryptograph and Data Securi

  • 2010 International Symposium On Information Theory & Its Applications (Isita2010)

    The topics of interest include Error Control Coding, Coding Theory and Practice, Coded Modulation, Data Compression and Source Coding, Pattern Recognition and Learning, Speech/Image Coding, Rate-Distortion Theory, Shannon Theory, Stochastic Processes, Cryptology and Data Security, Data Networks, Multi-User Information Theory, Quantum Information Processing

  • 2012 International Symposium on Information Theory and its Applications (ISITA)

    The scope of this symposium includes all aspects of information theory and its applications. It covers a wide range of topics such as Shannon Theory, Coding Theory, and Cryptology as well as novel applications of Information Theory.

  • 2014 International Symposium on Information Theory and its Applications (ISITA)

    The ISITA symposium features world-class speakers, plenary talks and technical sessions on a diverse range of topics within the field of information theory Interested authors are invited to submit papers describing novel and previously unpublished results on topics in information theory and its applications, including, but not limited to: Error Control Coding, Coded Modulation, Communication Systems, Detection and EstimationSpread Spectrum Systems, Signal Processing, Rate-Distortion Theory, Stochastic Processes, Network Coding, Shannon Theory, Coding Theory and Practice, Data Compression and Source Coding, Data Storage, Mobile Communications, Pattern Recognition and Learning, Speech/Image Coding, Multi-Terminal Information Theory, Cryptography and Data Security, Applications of Information Theory, and Quantum Information Theory.

  • 2016 International Symposium on Information Theory and Its Applications (ISITA)

    The scope of the symposium includes all aspects of information theory and its applications. It covers a wide range of topics such as Shannon Theory, Coding Theory, and Information Security as well as novel applications of information theory.

  • 2018 International Symposium on Information Theory and Its Applications (ISITA)

    The scope of the symposium includes all aspects of information theory and its applications. It covers a wide range of topics such as Shannon Theory, Coding Theory, and Information Security as well as novel applications of information theory.


ICC 2020 - 2020 IEEE International Conference on Communications

All topics relating to existing and emerging communications networking technologies.


2019 IEEE Radio and Wireless Symposium (RWS)

This is a conference with a focus on wireless components, applications, and systems that impact both our current and future life style. The conference's main niche is to bring together technologists, circuit designers, system designers, and entrepreneurs at a single event. It was and is the place where these worlds meet, where new processes and systems can be benchmarked against the needs of circuit designers at the bleeding edge of RF systems, where today's design compromises can trigger tomorrow's advanced technologies. Where dreams can become a reality. RWS is the cornerstone conference for Radio Wireless Week.


2019 Cross Strait Quad-Regional Radio Science and Wireless Technology Conference (CSQRWC)

As one of the most important annual academic conferences in communication science andtechnology for Chinese not only Cross Strait Quad -Region but also all over the world.



Periodicals related to Identity-based encryption

Back to Top

Applied Superconductivity, IEEE Transactions on

Contains articles on the applications and other relevant technology. Electronic applications include analog and digital circuits employing thin films and active devices such as Josephson junctions. Power applications include magnet design as well asmotors, generators, and power transmission


Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Broadcasting, IEEE Transactions on

Broadcast technology, including devices, equipment, techniques, and systems related to broadcast technology, including the production, distribution, transmission, and propagation aspects.


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...



Most published Xplore authors for Identity-based encryption

Back to Top

No authors for "Identity-based encryption"


Xplore Articles related to Identity-based encryption

Back to Top

IEEE Draft Standard for Identity-Based Cryptographic Techniques using Pairings

IEEE P1363/D6, December 2011, 2011

This standard specifies common identity-based public-key cryptographic techniques that use pairings, including mathematical primitives for secret value (key) derivation, public-key encryption, and digital signatures, and cryptographic schemes based on those primitives. It also specifies related cryptographic parameters, public keys and private keys. The purpose of this standard is to provide a reference for specifications of a variety of techniques from ...


Low field cold iron SC magnet technology: new aspects of application

IEEE Transactions on Applied Superconductivity, 2000

The results of the development of 2 T cold iron SC-magnet technology at the Laboratory of High Energies, JINR including a Nuclotron-type SC booster and a VLHC cryomagnetic assembly design are presented. New experimental data on the Nuclotron magnet system operation are discussed.


Adding real-time filters to object-oriented specification of time critical systems

Proceedings. 2nd IEEE Workshop on Industrial Strength Formal Specification Techniques, 1998

We describe Real-Time Object-Z (RTOZ), a language with real-time extensions to Object-Z, and describe informally its semantics. The novelty of our approach lies in the minimal set of syntactic extensions to Object-Z and in the introduction of real-time filters for the separation of real time constraints from the functional specification of objects. Both the functional specification and filter specification for ...


Method of Detecting the Sybil Attack Based on Ranging in Wireless Sensor Network

2009 5th International Conference on Wireless Communications, Networking and Mobile Computing, 2009

Method of detecting the Sybil attack based on ranging is proposed in this paper. Every node finds out the suspect nodes by checking the neighbor nodes range. The neighbor nodes exchange the information and find out Sybil node. As a result, the method has costs less, no use for high accurate range, but it has extremely precise. It is particularly ...


Novel approach to secure broadcast in distributed systems

Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology, 1995

We present a scheme for secure broadcasting confidential data messages in distributed system or networking environments. The scheme is based on the theory of linear block codes and does not make use of any encryption algorithms. In addition, we show how to achieve reliable message transmission in the presence of channel errors by sending an error correcting parity message in ...



Educational Resources on Identity-based encryption

Back to Top

IEEE-USA E-Books

  • IEEE Draft Standard for Identity-Based Cryptographic Techniques using Pairings

    This standard specifies common identity-based public-key cryptographic techniques that use pairings, including mathematical primitives for secret value (key) derivation, public-key encryption, and digital signatures, and cryptographic schemes based on those primitives. It also specifies related cryptographic parameters, public keys and private keys. The purpose of this standard is to provide a reference for specifications of a variety of techniques from which applications may select.

  • Low field cold iron SC magnet technology: new aspects of application

    The results of the development of 2 T cold iron SC-magnet technology at the Laboratory of High Energies, JINR including a Nuclotron-type SC booster and a VLHC cryomagnetic assembly design are presented. New experimental data on the Nuclotron magnet system operation are discussed.

  • Adding real-time filters to object-oriented specification of time critical systems

    We describe Real-Time Object-Z (RTOZ), a language with real-time extensions to Object-Z, and describe informally its semantics. The novelty of our approach lies in the minimal set of syntactic extensions to Object-Z and in the introduction of real-time filters for the separation of real time constraints from the functional specification of objects. Both the functional specification and filter specification for any time critical system can be developed using the syntax of RTOZ. The semantics of RTOZ provides a consistent mapping between the classes in an Object-Z specification and their corresponding real-time constraints. We illustrate the expressive power of RTOZ with a case study.

  • Method of Detecting the Sybil Attack Based on Ranging in Wireless Sensor Network

    Method of detecting the Sybil attack based on ranging is proposed in this paper. Every node finds out the suspect nodes by checking the neighbor nodes range. The neighbor nodes exchange the information and find out Sybil node. As a result, the method has costs less, no use for high accurate range, but it has extremely precise. It is particularly suitable for the low-cost, lacking resources of wireless sensor network.

  • Novel approach to secure broadcast in distributed systems

    We present a scheme for secure broadcasting confidential data messages in distributed system or networking environments. The scheme is based on the theory of linear block codes and does not make use of any encryption algorithms. In addition, we show how to achieve reliable message transmission in the presence of channel errors by sending an error correcting parity message in the secure broadcast scheme.

  • Safe Path Network: A New Approach To Path-planning

    This paper describes a new method to solve the path-planning problem. This method generates a network named Safe Path Network ( SPN for short ) for a known polygonal environment.The nodes of the SPN are the minimal safe areas In which moving object can turn around without collision. The arcs of the network are connections between these nodes with information to navigate safe motion Of the object either along straight or curve path. Actually,SPN is motivated by the VGRAPH [2]. Having established the SPN,the path-planning problem taking account of the shape and orientation of a moving object becomes a network searching problem.This method can solve many difficult path-planning problems with lower computational complexity.

  • Adlets migration and handling in a distributed object environment

    Large distributed systems may contain millions of objects that have to be managed. This makes it impossible to specify management policies for individual objects. Instead it is necessary to specify policy for groups of objects. This paper describes a framework for the construction of the ADlets Distributed Migration Mechanism (ADDMM), which is used by the Adlet System for the management of adlets. The Adlet System is a new approach for multimedia information retrieval and fusion based on the concept of active document advertising, whereby an adlet (the metadata of a document) travels in the network to seek out documents of interest to the parent document, and at the same time advertises its parent document to other interested adlets. ADDMM provides the Adlet System with the facility of managing migrating adlets. ADDMM supports location-independent transparency and minimal interface by utilizing the ADDNS naming system that provides a mechanism for transparent naming and locating adlets, which in turn supports ADDMM transparency at the adlet access level. With the ADDMM migration mechanism, various adlet migration protocols can be constructed and deployed. A visual diagram is introduced to specify such protocols for adlets migration, which can also be employed to specify distributed object management policies.

  • Prediction and adaptation in Active Harmony

    We describe the design and early functionality of the Active Harmony global resource management system. Harmony is an infrastructure designed to efficiently execute parallel applications in large scale, dynamic environments. Harmony differs from other projects with similar goals in that the system automatically adapts ongoing computations to changing conditions through online reconfiguration. This reconfiguration can consist of system directed migration of work at several different levels, or automatic application adaptation through the use of tuning options exported by Harmony aware applications. We describe early experience with work migration at the level of procedures, processes and lightweight threads.

  • /spl rho/: hierarchical modeling of parallel architectures

    Although there exist many approaches for classification of computer architectures, no system is able to distinguish parallel computers adequately yet. The first part of this paper is a brief survey of the main characteristics of various parallel architecture concepts and several approaches of classification. We realized that the idea of defining a sharp classification system is questionable in the world of parallel computing. But we also recognized important structural similarities of computing systems. So we introduce a modeling system, called /spl rho/ (recursive hierarchical objects), which allows to describe the structure of various computing systems hierarchically However, we do not aim at a new classification system but at a scheme for modeling parallel architectures.

  • The compatibility of strong automation of comparative LCA with the broad possibility of creative decisions in a new tool for analysis of similar products concerning environmental consequence

    Based on a new method of calculation, the software "Oeko-Bar for the comparative analysis of different design solutions of the same product or for analysis of similar products" is in development at the Swiss Federal Institute of Technology, Zurich. This contribution describes the solutions used in "Oeko-Bar" to ensure a high degree of automation of the analysis and at the same time to enhance the level of flexibility and adaptability of the software for the analysis of the great diversity of industrial equipment.



Standards related to Identity-based encryption

Back to Top

No standards are currently tagged "Identity-based encryption"