Showing results 49 to 68 of 83
< previous
next >
Title | Author(s) | Issue Date | |
---|---|---|---|
New insight to preserve online survey accuracy and privacy in big data era Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2014 | ||
Online/offline ring signature scheme Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2009 | ||
Optimistic fair exchange in the enhanced chosen-key model Journal:Theoretical Computer Science | 2015 | ||
Perfect ambiguous optimistic fair exchange Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2012 | ||
PEVTS: Privacy-preserving electric vehicles test-bedding scheme Proceeding/Conference:Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS | 2016 | ||
PPDCP-ABE: Privacy-preserving decentralized ciphertext-policy attribute-based encryption Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2014 | ||
PPFilter: Provider Privacy-aware Encrypted Filtering System Journal:IEEE Transactions on Services Computing | 2018 | ||
Practical anonymous divisible E-cash from bounded accumulators Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2008 | ||
Practical compact E-cash Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2007 | ||
Privacy-enhanced keyword search in clouds Proceeding/Conference:Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 | 2013 | ||
Privacy-preserved access control for cloud computing Proceeding/Conference:Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011 | 2011 | ||
Proof-of-knowledge of representation of committed value and its applications Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2010 | ||
Public cloud data auditing with practical key update and zero knowledge privacy Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2016 | ||
Realizing fully secure unrestricted ID-based ring signature in the standard model based on HIBE Journal:IEEE Transactions on Information Forensics and Security | 2013 | ||
Relations among privacy notions for signcryption and key invisible "sign-then-encrypt" Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2013 | ||
Revisiting optimistic fair exchange based on ring signatures Journal:IEEE Transactions on Information Forensics and Security | 2014 | ||
Revisiting Security Against the Arbitrator in Optimistic Fair Exchange Journal:Computer Journal | 2014 | ||
Sanitizable signatures revisited Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2008 | ||
Secure delegation of signing power from factorization Journal:Computer Journal | 2015 | ||
Secure sharing and searching for real-time video data in mobile cloud Journal:IEEE Network | 2015 |