Showing results 21 to 40 of 83
< previous
next >
Title | Author(s) | Issue Date | |
---|---|---|---|
Concurrent signatures with fully negotiable binding control Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2011 | ||
Constant-size dynamic k-TAA Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2006 | ||
Constant-size dynamic k-times anonymous authentication Journal:IEEE Systems Journal | 2013 | ||
Constant-size id-based linkable and revocable-iff-linked ring signature Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2006 | ||
(Convertible) undeniable signatures without random oracles Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2007 | ||
Dynamic universal accumulators for DDH groups and their application to attribute-based anonymous credential systems Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2009 | ||
Efficient and Adaptive Procurement Protocol with Purchasing Privacy Journal:IEEE Transactions on Services Computing | 2018 | ||
Efficient escrow-free identity-based signature Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2012 | ||
Efficient non-interactive range proof Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2009 | ||
Efficient privacy-preserving charging station reservation system for electric vehicles Journal:Computer Journal | 2016 | ||
Efficient semi-static secure broadcast encryption scheme Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2014 | ||
Electronic cash with anonymous user suspension Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2011 | ||
Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage Journal:International Journal of Information Security | 2015 | ||
Enhancing location privacy for electric vehicles (at the right time) Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2012 | ||
Escrowed deniable identification schemes Journal:International Journal of Security and its Applications | 2010 | ||
Escrowed deniable identification schemes Proceeding/Conference:Communications in Computer and Information Science | 2009 | ||
Escrowed linkability of ring signatures and its applications Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2006 | ||
Fairness in concurrent signatures revisited Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2013 | ||
Functional encryption for computational hiding in prime order groups via pair encodings Journal:Designs, Codes, and Cryptography | 2018 | ||
How to construct identity-based signatures without the key escrow problem Journal:International Journal of Information Security | 2010 |