Showing results 2 to 21 of 22
< previous
next >
Title | Author(s) | Issue Date | |
---|---|---|---|
An e-lottery scheme using Verifiable Random Function Proceeding/Conference:Lecture Notes in Computer Science | 2005 | ||
Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity Journal:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2004 | ||
Efficient identity based ring signature Proceeding/Conference:Lecture Notes in Computer Science | 2005 | ||
Exclusion-intersection encryption Proceeding/Conference:IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2011 | 2011 | ||
Exclusion-intersection encryption Journal:International Journal of Security and Networks | 2011 | ||
Forward-secure multisignature and blind signature schemes Journal:Applied Mathematics and Computation | 2005 | ||
A generic anti-spyware solution by access control list at kernel level Journal:Journal of Systems and Software | 2005 | ||
Identity based delegation network Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2005 | ||
Identity based ring signature: Why, how and what next Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2005 | ||
Identity based threshold ring signature Proceeding/Conference:Lecture Notes in Computer Science | 2005 | ||
Identity-based encryption resilient to continual auxiliary leakage Proceeding/Conference:Lecture Notes in Computer Science | 2012 | ||
Multiplicative forward-secure threshold signature scheme Journal:International Journal of Network Security | 2008 | ||
PE(AR)2: privacy-enhanced anonymous authentication with reputation and revocation Proceeding/Conference:Lecture Notes in Computer Science | 2012 | ||
Practical electronic lotteries with offline TTP Journal:Computer Communications | 2006 | ||
Related randomness attacks for public key crypto systems Proceeding/Conference:ASIACCS 2015 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security | 2015 | ||
Role activation management in role based access control Proceeding/Conference:Lecture Notes in Computer Science | 2005 | ||
Secure hierarchical identity based signature and its application Journal:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2004 | ||
Separable and anonymous identity-based key issuing Proceeding/Conference:Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS | 2005 | ||
SPICE - simple privacy-preserving identity-management for cloud environment Proceeding/Conference:Lecture Notes in Computer Science | 2012 | ||
Timed-release encryption revisited Proceeding/Conference:Lecture Notes in Computer Science | 2008 |