Showing results 1 to 12 of 12
Title | Author(s) | Issue Date | |
---|---|---|---|
Achieving flexibility for ABE with outsourcing via proxy re-encryption Proceeding/Conference:ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security | 2018 | ||
Collusion resistant watermarking schemes for cryptographic functionalities Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2019 | ||
Decentralized blacklistable anonymous credentials with reputation Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2018 | ||
Decentralized blacklistable anonymous credentials with reputation Journal:Computers and Security | 2019 | ||
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2019 | ||
Lattice-based universal accumulator with nonmembership arguments Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2018 | ||
Leakage-resilient functional encryption via pair encodings Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2016 | ||
New Empirical Traceability Analysis of CryptoNote-Style Blockchains Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2019 | ||
Position based cryptography with location privacy: A step for Fog Computing Journal:Future Generation Computer Systems | 2018 | ||
Practical range proof for cryptocurrency monero with provable security Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2018 | ||
Towards leakage-resilient fine-grained access control in fog computing Journal:Future Generation Computer Systems | 2018 | ||
Unforgeable watermarking schemes with public extraction Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2018 |