Showing results 33 to 46 of 46
< previous
| Title | Author(s) | Issue Date | |
|---|---|---|---|
Sanitizable signatures revisited Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2008 | ||
Secure sharing and searching for real-time video data in mobile cloud Journal:IEEE Network | 2015 | ||
Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model Proceeding/Conference:eProceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07 | 2007 | ||
Separable linkable threshold ring signatures Proceeding/Conference:Cryptology - INDOCRYPT 2004: 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004. Proceedings | 2004 | ||
Short generic transformation to strongly unforgeable signature in the standard model Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2010 | ||
Special issue on security and privacy for smart cities Journal:Personal and Ubiquitous Computing | 2017 | ||
Threshold ring signature without random oracles Proceeding/Conference:Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011 | 2011 | ||
Time-based direct revocable ciphertext-policy attribute-based encryption with short revocation list Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2018 | ||
Time-bound anonymous authentication for roaming networks Journal:IEEE Transactions on Information Forensics and Security | 2015 | ||
Towards anonymous ciphertext indistinguishability with identity leakage Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2013 | ||
Towards efficient verifiable conjunctive keyword search for large encrypted database Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2018 | ||
Towards secure and cost-effective fuzzy access control in mobile cloud computing Journal:Soft Computing | 2017 | ||
Traceable and retrievable identity-based encryption Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2008 | ||
While mobile encounters with clouds Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2016 |
