Showing results 16 to 35 of 83
< previous
next >
Title | Author(s) | Issue Date | |
---|---|---|---|
Certificate based (linkable) ring signature Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2007 | ||
Cloud computing security and privacy: Standards and regulations Journal:Computer Standards and Interfaces | 2017 | ||
Cloud data integrity checking with an identity-based auditing mechanism from RSA Journal:Future Generation Computer Systems | 2016 | ||
Collusion-resistance in optimistic fair exchange Journal:IEEE Transactions on Information Forensics and Security | 2014 | ||
Compact e-cash from bounded accumulator Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2007 | ||
Concurrent signatures with fully negotiable binding control Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2011 | ||
Constant-size dynamic k-TAA Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2006 | ||
Constant-size dynamic k-times anonymous authentication Journal:IEEE Systems Journal | 2013 | ||
Constant-size id-based linkable and revocable-iff-linked ring signature Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2006 | ||
(Convertible) undeniable signatures without random oracles Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2007 | ||
Dynamic universal accumulators for DDH groups and their application to attribute-based anonymous credential systems Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2009 | ||
Efficient and Adaptive Procurement Protocol with Purchasing Privacy Journal:IEEE Transactions on Services Computing | 2018 | ||
Efficient escrow-free identity-based signature Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2012 | ||
Efficient non-interactive range proof Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2009 | ||
Efficient privacy-preserving charging station reservation system for electric vehicles Journal:Computer Journal | 2016 | ||
Efficient semi-static secure broadcast encryption scheme Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2014 | ||
Electronic cash with anonymous user suspension Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2011 | ||
Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage Journal:International Journal of Information Security | 2015 | ||
Enhancing location privacy for electric vehicles (at the right time) Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2012 | ||
Escrowed deniable identification schemes Journal:International Journal of Security and its Applications | 2010 |