Showing results 17 to 36 of 37
< previous
next >
Title | Author(s) | Issue Date | Views | |
---|---|---|---|---|
2019 | 13 | |||
Improving privacy and security in decentralized ciphertext-policy attribute-based encryption Journal:IEEE Transactions on Information Forensics and Security | 2015 | 21 | ||
Is the notion of divisible on-line/off-line signatures stronger than on-line/off-line signatures? Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2009 | 7 | ||
Malicious KGC attacks in certificateless cryptography Proceeding/Conference:eProceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07 | 2007 | 10 | ||
PPDCP-ABE: Privacy-preserving decentralized ciphertext-policy attribute-based encryption Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2014 | 10 | ||
Practical anonymous divisible E-cash from bounded accumulators Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2008 | |||
Practical compact E-cash Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2007 | |||
Privacy-enhanced keyword search in clouds Proceeding/Conference:Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 | 2013 | |||
Privacy-preserved access control for cloud computing Proceeding/Conference:Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011 | 2011 | 5 | ||
Proof of retrievability with public verifiability resilient against related-key attacks Journal:IET Information Security | 2015 | 8 | ||
Proof-of-knowledge of representation of committed value and its applications Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2010 | 9 | ||
Public-key encryption resilient against linear related-key attacks revisited Proceeding/Conference:Proceedings - 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014 | 2015 | 11 | ||
Public-key encryption resilient to linear related-key attacks Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST | 2013 | 11 | ||
Relations between robustness and RKA security under public-key encryption Journal:Theoretical Computer Science | 2016 | 9 | ||
Sanitizable signatures revisited Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2008 | 8 | ||
Secure delegation of signing power from factorization Journal:Computer Journal | 2015 | |||
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents Journal:Information Processing Letters | 2014 | 9 | ||
Signcryption secure against linear related-key attacks Journal:Computer Journal | 2014 | 15 | ||
Towards a cryptographic treatment of publish/subscribe systems Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2010 | 7 | ||
Towards a cryptographic treatment of publish/subscribe systems Journal:Journal of Computer Security | 2014 | 15 |