Browsing by Author Huang, Qiong

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 6 of 6
TitleAuthor(s)Issue DateViews
Concurrent signatures with fully negotiable binding control
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2011
12
Efficient non-interactive range proof
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2009
18
 
Escrowed deniable identification schemes
Journal:International Journal of Security and its Applications
2010
25
Escrowed deniable identification schemes
Proceeding/Conference:Communications in Computer and Information Science
2009
10
Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2011
18
Traceable and retrievable identity-based encryption
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2008
11