Showing results 62 to 81 of 83
< previous
next >
Title | Author(s) | Issue Date | |
---|---|---|---|
Realizing fully secure unrestricted ID-based ring signature in the standard model based on HIBE Journal:IEEE Transactions on Information Forensics and Security | 2013 | ||
Relations among privacy notions for signcryption and key invisible "sign-then-encrypt" Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2013 | ||
Revisiting optimistic fair exchange based on ring signatures Journal:IEEE Transactions on Information Forensics and Security | 2014 | ||
Revisiting Security Against the Arbitrator in Optimistic Fair Exchange Journal:Computer Journal | 2014 | ||
Sanitizable signatures revisited Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2008 | ||
Secure delegation of signing power from factorization Journal:Computer Journal | 2015 | ||
Secure sharing and searching for real-time video data in mobile cloud Journal:IEEE Network | 2015 | ||
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents Journal:Information Processing Letters | 2014 | ||
Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model Proceeding/Conference:eProceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07 | 2007 | ||
Server-aided signatures verification secure against collusion attack Proceeding/Conference:Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011 | 2011 | ||
Server-aided signatures verification secure against collusion attack Proceeding/Conference:Information Security Technical Report | 2013 | ||
Short e-cash Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2005 | ||
Short generic transformation to strongly unforgeable signature in the standard model Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2010 | ||
Short linkable ring signatures revisited Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2006 | ||
(Strong) multi-designated verifiers signatures secure against rogue key attack Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2012 | ||
(Strong) multidesignated verifiers signatures secure against rogue key attack Journal:Concurrency Computation: Practice and Experience | 2014 | ||
Threshold ring signature without random oracles Proceeding/Conference:Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011 | 2011 | ||
Towards a cryptographic treatment of publish/subscribe systems Journal:Journal of Computer Security | 2014 | ||
Towards a cryptographic treatment of publish/subscribe systems Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2010 | ||
Traceable and retrievable identity-based encryption Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2008 |