Showing results 1 to 6 of 6
Title | Author(s) | Issue Date | |
---|---|---|---|
Anonymous signcryption against linear related-key attacks Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2013 | ||
Complete robustness in identity-based encryption Proceeding/Conference:Provable Security: 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014: Proceedings | 2014 | ||
Fuzzy public-key encryption based on biometric data Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2017 | ||
Public-key encryption resilient against linear related-key attacks revisited Proceeding/Conference:Proceedings - 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014 | 2015 | ||
Public-key encryption resilient to linear related-key attacks Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST | 2013 | ||
Verifiable and anonymous encryption in asymmetric bilinear maps Proceeding/Conference:Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 | 2013 |