Showing results 1 to 20 of 83
next >
Title | Author(s) | Issue Date | |
---|---|---|---|
A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing Journal:IEEE Transactions on Information Forensics and Security | 2014 | ||
A general framework for secure sharing of personal health records in cloud system Journal:Journal of Computer and System Sciences | 2017 | ||
A new payment system for enhancing location privacy of electric vehicles Journal:IEEE Transactions on Vehicular Technology | 2014 | ||
A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing Journal:Future Generation Computer Systems | 2015 | ||
A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity (extended abstract) Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2010 | ||
A tag based encoding: An efficient encoding for predicate encryption in prime order groups Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2016 | ||
A visual one-time password authentication scheme using mobile devices Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2015 | ||
AAC-OT: Accountable Oblivious Transfer with Access Control Journal:IEEE Transactions on Information Forensics and Security | 2015 | ||
ABKS-CSC: attribute-based keyword search with constant-size ciphertexts Journal:Security and Communication Networks | 2016 | ||
Adaptively secure identity-based broadcast encryption with a constant-sized ciphertext Journal:IEEE Transactions on Information Forensics and Security | 2015 | ||
An adaptively CCA-secure ciphertext-policy attribute-based proxy re-encryption for cloud data sharing Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2014 | ||
An efficient KP-ABE with short ciphertexts in prime order groups under standard assumption Proceeding/Conference:ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security | 2017 | ||
Attribute-based optimistic fair exchange: How to restrict brokers with policies Journal:Theoretical Computer Science | 2014 | ||
Attribute-based signature and its applications Proceeding/Conference:Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010 | 2010 | ||
Authentication and transaction verification using QR codes with a mobile device Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2016 | ||
Certificate based (linkable) ring signature Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2007 | ||
Cloud computing security and privacy: Standards and regulations Journal:Computer Standards and Interfaces | 2017 | ||
Cloud data integrity checking with an identity-based auditing mechanism from RSA Journal:Future Generation Computer Systems | 2016 | ||
Collusion-resistance in optimistic fair exchange Journal:IEEE Transactions on Information Forensics and Security | 2014 | ||
Compact e-cash from bounded accumulator Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2007 |