Showing results 38 to 57 of 83
< previous
next >
Title | Author(s) | Issue Date | |
---|---|---|---|
Fairness in concurrent signatures revisited Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2013 | ||
Functional encryption for computational hiding in prime order groups via pair encodings Journal:Designs, Codes, and Cryptography | 2018 | ||
How to construct identity-based signatures without the key escrow problem Journal:International Journal of Information Security | 2010 | ||
How to construct identity-based signatures without the key escrow problem Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2010 | ||
Identity-Based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage Journal:IEEE Transactions on Information Forensics and Security | 2017 | ||
2019 | |||
Improvements on an authentication scheme for vehicular sensor networks Journal:Expert Systems with Applications | 2014 | ||
Improving privacy and security in decentralized ciphertext-policy attribute-based encryption Journal:IEEE Transactions on Information Forensics and Security | 2015 | ||
Is the notion of divisible on-line/off-line signatures stronger than on-line/off-line signatures? Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2009 | ||
k-Times Attribute-Based Anonymous Access Control for Cloud Computing Journal:IEEE Transactions on Computers | 2015 | ||
Linkable ring signature with unconditional anonymity Journal:IEEE Transactions on Knowledge and Data Engineering | 2014 | ||
New insight to preserve online survey accuracy and privacy in big data era Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2014 | ||
Online/offline ring signature scheme Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2009 | ||
Optimistic fair exchange in the enhanced chosen-key model Journal:Theoretical Computer Science | 2015 | ||
Perfect ambiguous optimistic fair exchange Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2012 | ||
PEVTS: Privacy-preserving electric vehicles test-bedding scheme Proceeding/Conference:Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS | 2016 | ||
PPDCP-ABE: Privacy-preserving decentralized ciphertext-policy attribute-based encryption Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2014 | ||
PPFilter: Provider Privacy-aware Encrypted Filtering System Journal:IEEE Transactions on Services Computing | 2018 | ||
Practical anonymous divisible E-cash from bounded accumulators Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2008 | ||
Practical compact E-cash Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2007 |