Showing results 1 to 20 of 37
next >
Title | Author(s) | Issue Date | |
---|---|---|---|
AAC-OT: Accountable Oblivious Transfer with Access Control Journal:IEEE Transactions on Information Forensics and Security | 2015 | ||
Anonymous broadcast encryption with an untrusted gateway Journal:International Journal of Security and Networks | 2014 | ||
Anonymous signcryption against linear related-key attacks Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2013 | ||
Comments on a Public Auditing Mechanism for Shared Cloud Data Service Journal:IEEE Transactions on Services Computing | 2015 | ||
Compact e-cash from bounded accumulator Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2007 | ||
Complete robustness in identity-based encryption Proceeding/Conference:Provable Security: 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014: Proceedings | 2014 | ||
Constant-size dynamic k-TAA Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2006 | ||
Constant-size dynamic k-times anonymous authentication Journal:IEEE Systems Journal | 2013 | ||
Dynamic universal accumulators for DDH groups and their application to attribute-based anonymous credential systems Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2009 | ||
Efficient non-interactive range proof Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2009 | ||
Electronic cash with anonymous user suspension Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2011 | ||
Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage Journal:International Journal of Information Security | 2015 | ||
Escrowed deniable identification schemes Journal:International Journal of Security and its Applications | 2010 | ||
Escrowed deniable identification schemes Proceeding/Conference:Communications in Computer and Information Science | 2009 | ||
How to construct identity-based signatures without the key escrow problem Journal:International Journal of Information Security | 2010 | ||
How to construct identity-based signatures without the key escrow problem Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2010 | ||
2019 | |||
Improving privacy and security in decentralized ciphertext-policy attribute-based encryption Journal:IEEE Transactions on Information Forensics and Security | 2015 | ||
Is the notion of divisible on-line/off-line signatures stronger than on-line/off-line signatures? Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2009 | ||
Malicious KGC attacks in certificateless cryptography Proceeding/Conference:eProceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07 | 2007 |