Showing results 1 to 9 of 9
Title | Author(s) | Issue Date | |
---|---|---|---|
Attribute-based signature and its applications Proceeding/Conference:Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010 | 2010 | ||
2016 | |||
Fine-grained two-factor access control for web-based cloud computing services Journal:IEEE Transactions on Information Forensics and Security | 2016 | ||
Practical threshold signatures without random oracles Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2007 | ||
Proxy ring signature: Formal definitions, efficient construction and new variant Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2007 | ||
Proxy ring signature: Formal definitions, efficient construction and new variant Proceeding/Conference:2006 International Conference on Computational Intelligence and Security, ICCIAS 2006 | 2007 | ||
Simulation-based selective opening security for receivers under chosen-ciphertext attacks Journal:Designs, Codes, and Cryptography | 2019 | ||
ThinORAM: Towards Practical Oblivious Data Access in Fog Computing Environment Journal:IEEE Transactions on Services Computing | 24-Dec-2019 | ||
Towards Blockchained Challenge-Based Collaborative Intrusion Detection Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2019 |