Showing results 1 to 11 of 11
Title | Author(s) | Issue Date | |
---|---|---|---|
A new payment system for enhancing location privacy of electric vehicles Journal:IEEE Transactions on Vehicular Technology | 2014 | ||
Efficient privacy-preserving charging station reservation system for electric vehicles Journal:Computer Journal | 2016 | ||
Enhancing location privacy for electric vehicles (at the right time) Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2012 | ||
Improving privacy and security in decentralized ciphertext-policy attribute-based encryption Journal:IEEE Transactions on Information Forensics and Security | 2015 | ||
k-Times Attribute-Based Anonymous Access Control for Cloud Computing Journal:IEEE Transactions on Computers | 2015 | ||
Linkable ring signature with unconditional anonymity Journal:IEEE Transactions on Knowledge and Data Engineering | 2014 | ||
New insight to preserve online survey accuracy and privacy in big data era Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2014 | ||
PPDCP-ABE: Privacy-preserving decentralized ciphertext-policy attribute-based encryption Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2014 | ||
Realizing fully secure unrestricted ID-based ring signature in the standard model based on HIBE Journal:IEEE Transactions on Information Forensics and Security | 2013 | ||
Short generic transformation to strongly unforgeable signature in the standard model Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2010 | ||
Threshold ring signature without random oracles Proceeding/Conference:Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011 | 2011 |