Showing results 1 to 6 of 6
Title | Author(s) | Issue Date | |
---|---|---|---|
Concurrent signatures with fully negotiable binding control Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2011 | ||
Efficient non-interactive range proof Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2009 | ||
Escrowed deniable identification schemes Journal:International Journal of Security and its Applications | 2010 | ||
Escrowed deniable identification schemes Proceeding/Conference:Communications in Computer and Information Science | 2009 | ||
Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2011 | ||
Traceable and retrievable identity-based encryption Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2008 |