Showing results 1 to 10 of 10
Title | Author(s) | Issue Date | |
---|---|---|---|
Anonymous broadcast encryption with an untrusted gateway Journal:International Journal of Security and Networks | 2014 | ||
Anonymous signcryption against linear related-key attacks Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2013 | ||
Complete robustness in identity-based encryption Proceeding/Conference:Provable Security: 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014: Proceedings | 2014 | ||
Fuzzy public-key encryption based on biometric data Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2017 | ||
Proof of retrievability with public verifiability resilient against related-key attacks Journal:IET Information Security | 2015 | ||
Public-key encryption resilient against linear related-key attacks revisited Proceeding/Conference:Proceedings - 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014 | 2015 | ||
Public-key encryption resilient to linear related-key attacks Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST | 2013 | ||
Relations between robustness and RKA security under public-key encryption Journal:Theoretical Computer Science | 2016 | ||
Signcryption secure against linear related-key attacks Journal:Computer Journal | 2014 | ||
Verifiable and anonymous encryption in asymmetric bilinear maps Proceeding/Conference:Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 | 2013 |