Showing results 47 to 66 of 83
< previous
next >
Title | Author(s) | Issue Date | |
---|---|---|---|
k-Times Attribute-Based Anonymous Access Control for Cloud Computing Journal:IEEE Transactions on Computers | 2015 | ||
Linkable ring signature with unconditional anonymity Journal:IEEE Transactions on Knowledge and Data Engineering | 2014 | ||
New insight to preserve online survey accuracy and privacy in big data era Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2014 | ||
Online/offline ring signature scheme Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2009 | ||
Optimistic fair exchange in the enhanced chosen-key model Journal:Theoretical Computer Science | 2015 | ||
Perfect ambiguous optimistic fair exchange Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2012 | ||
PEVTS: Privacy-preserving electric vehicles test-bedding scheme Proceeding/Conference:Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS | 2016 | ||
PPDCP-ABE: Privacy-preserving decentralized ciphertext-policy attribute-based encryption Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2014 | ||
PPFilter: Provider Privacy-aware Encrypted Filtering System Journal:IEEE Transactions on Services Computing | 2018 | ||
Practical anonymous divisible E-cash from bounded accumulators Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2008 | ||
Practical compact E-cash Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2007 | ||
Privacy-enhanced keyword search in clouds Proceeding/Conference:Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 | 2013 | ||
Privacy-preserved access control for cloud computing Proceeding/Conference:Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011 | 2011 | ||
Proof-of-knowledge of representation of committed value and its applications Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2010 | ||
Public cloud data auditing with practical key update and zero knowledge privacy Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2016 | ||
Realizing fully secure unrestricted ID-based ring signature in the standard model based on HIBE Journal:IEEE Transactions on Information Forensics and Security | 2013 | ||
Relations among privacy notions for signcryption and key invisible "sign-then-encrypt" Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2013 | ||
Revisiting optimistic fair exchange based on ring signatures Journal:IEEE Transactions on Information Forensics and Security | 2014 | ||
Revisiting Security Against the Arbitrator in Optimistic Fair Exchange Journal:Computer Journal | 2014 | ||
Sanitizable signatures revisited Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2008 |