Showing results 27 to 46 of 83
< previous
next >
Title | Author(s) | Issue Date | |
---|---|---|---|
Efficient and Adaptive Procurement Protocol with Purchasing Privacy Journal:IEEE Transactions on Services Computing | 2018 | ||
Efficient escrow-free identity-based signature Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2012 | ||
Efficient non-interactive range proof Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2009 | ||
Efficient privacy-preserving charging station reservation system for electric vehicles Journal:Computer Journal | 2016 | ||
Efficient semi-static secure broadcast encryption scheme Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2014 | ||
Electronic cash with anonymous user suspension Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2011 | ||
Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage Journal:International Journal of Information Security | 2015 | ||
Enhancing location privacy for electric vehicles (at the right time) Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2012 | ||
Escrowed deniable identification schemes Journal:International Journal of Security and its Applications | 2010 | ||
Escrowed deniable identification schemes Proceeding/Conference:Communications in Computer and Information Science | 2009 | ||
Escrowed linkability of ring signatures and its applications Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2006 | ||
Fairness in concurrent signatures revisited Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2013 | ||
Functional encryption for computational hiding in prime order groups via pair encodings Journal:Designs, Codes, and Cryptography | 2018 | ||
How to construct identity-based signatures without the key escrow problem Journal:International Journal of Information Security | 2010 | ||
How to construct identity-based signatures without the key escrow problem Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2010 | ||
Identity-Based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage Journal:IEEE Transactions on Information Forensics and Security | 2017 | ||
2019 | |||
Improvements on an authentication scheme for vehicular sensor networks Journal:Expert Systems with Applications | 2014 | ||
Improving privacy and security in decentralized ciphertext-policy attribute-based encryption Journal:IEEE Transactions on Information Forensics and Security | 2015 | ||
Is the notion of divisible on-line/off-line signatures stronger than on-line/off-line signatures? Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2009 |