Showing results 40 to 59 of 83
< previous
next >
Title | Author(s) | Issue Date | |
---|---|---|---|
How to construct identity-based signatures without the key escrow problem Journal:International Journal of Information Security | 2010 | ||
How to construct identity-based signatures without the key escrow problem Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2010 | ||
Identity-Based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage Journal:IEEE Transactions on Information Forensics and Security | 2017 | ||
2019 | |||
Improvements on an authentication scheme for vehicular sensor networks Journal:Expert Systems with Applications | 2014 | ||
Improving privacy and security in decentralized ciphertext-policy attribute-based encryption Journal:IEEE Transactions on Information Forensics and Security | 2015 | ||
Is the notion of divisible on-line/off-line signatures stronger than on-line/off-line signatures? Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2009 | ||
k-Times Attribute-Based Anonymous Access Control for Cloud Computing Journal:IEEE Transactions on Computers | 2015 | ||
Linkable ring signature with unconditional anonymity Journal:IEEE Transactions on Knowledge and Data Engineering | 2014 | ||
New insight to preserve online survey accuracy and privacy in big data era Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2014 | ||
Online/offline ring signature scheme Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2009 | ||
Optimistic fair exchange in the enhanced chosen-key model Journal:Theoretical Computer Science | 2015 | ||
Perfect ambiguous optimistic fair exchange Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2012 | ||
PEVTS: Privacy-preserving electric vehicles test-bedding scheme Proceeding/Conference:Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS | 2016 | ||
PPDCP-ABE: Privacy-preserving decentralized ciphertext-policy attribute-based encryption Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2014 | ||
PPFilter: Provider Privacy-aware Encrypted Filtering System Journal:IEEE Transactions on Services Computing | 2018 | ||
Practical anonymous divisible E-cash from bounded accumulators Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2008 | ||
Practical compact E-cash Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2007 | ||
Privacy-enhanced keyword search in clouds Proceeding/Conference:Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 | 2013 | ||
Privacy-preserved access control for cloud computing Proceeding/Conference:Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011 | 2011 |