Showing results 1 to 20 of 46
next >
Title | Author(s) | Issue Date | |
---|---|---|---|
A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing Journal:IEEE Transactions on Information Forensics and Security | 2014 | ||
A general framework for secure sharing of personal health records in cloud system Journal:Journal of Computer and System Sciences | 2017 | ||
A new payment system for enhancing location privacy of electric vehicles Journal:IEEE Transactions on Vehicular Technology | 2014 | ||
A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing Journal:Future Generation Computer Systems | 2015 | ||
A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity (extended abstract) Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2010 | ||
A Survey on Access Control in Fog Computing Journal:IEEE Communications Magazine | 2018 | ||
An efficient non-interactive multi-client searchable encryption with support for boolean queries Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2016 | ||
Certificate based (linkable) ring signature Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2007 | ||
Constant-size id-based linkable and revocable-iff-linked ring signature Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2006 | ||
(Convertible) undeniable signatures without random oracles Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2007 | ||
Efficient and Adaptive Procurement Protocol with Purchasing Privacy Journal:IEEE Transactions on Services Computing | 2018 | ||
Efficient construction of completely non-malleable CCA secure public key encryption Proceeding/Conference:ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security | 2016 | ||
Efficient escrow-free identity-based signature Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2012 | ||
Efficient privacy-preserving charging station reservation system for electric vehicles Journal:Computer Journal | 2016 | ||
Enhancing location privacy for electric vehicles (at the right time) Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2012 | ||
Erratum to: Special issue on security and privacy for smart cities (Personal and Ubiquitous Computing, (2017), 21, 5, (775), 10.1007/s00779-017-1043-z) Journal:Personal and Ubiquitous Computing | 2017 | ||
Fine-grained two-factor access control for web-based cloud computing services Journal:IEEE Transactions on Information Forensics and Security | 2016 | ||
Fully secure ciphertext-policy attribute based encryption with security mediator Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2015 | ||
ID-based ring signature scheme secure in the standard model Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2006 | ||
Improvements on an authentication scheme for vehicular sensor networks Journal:Expert Systems with Applications | 2014 |