Showing results 30 to 37 of 37
< previous
Title | Author(s) | Issue Date | |
---|---|---|---|
Relations between robustness and RKA security under public-key encryption Journal:Theoretical Computer Science | 2016 | ||
Sanitizable signatures revisited Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2008 | ||
Secure delegation of signing power from factorization Journal:Computer Journal | 2015 | ||
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents Journal:Information Processing Letters | 2014 | ||
Signcryption secure against linear related-key attacks Journal:Computer Journal | 2014 | ||
Towards a cryptographic treatment of publish/subscribe systems Journal:Journal of Computer Security | 2014 | ||
Towards a cryptographic treatment of publish/subscribe systems Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2010 | ||
Verifiable and anonymous encryption in asymmetric bilinear maps Proceeding/Conference:Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 | 2013 |