Showing results 1 to 14 of 14
| Title | Author(s) | Issue Date | |
|---|---|---|---|
A new payment system for enhancing location privacy of electric vehicles Journal:IEEE Transactions on Vehicular Technology | 2014 | ||
Efficient privacy-preserving charging station reservation system for electric vehicles Journal:Computer Journal | 2016 | ||
Enhancing location privacy for electric vehicles (at the right time) Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2012 | ||
First-Line Lorlatinib Versus Crizotinib in Asian Patients With Advanced ALK-Positive NSCLC: Five-Year Outcomes From the CROWN Study Journal:Journal of Thoracic Oncology | Wu, Yi LongKim, Hye RyunSoo, Ross A.Zhou, QingAkamatsu, HiroakiChang, Gee ChenChiu, Chao HuaHayashi, HidetoshiKim, Sang WeGoto, YasushiKato, TerufumiZhou, JianyingLee, Victor Ho FunNishio, MakotoHan, BaohuiKim, Dong WanLu, ShunPolli, AnnaMartini, Jean FrançoisToffalorio, FrancescaWong, Chew HooiMok, Tony | 28-Feb-2025 | |
Improving privacy and security in decentralized ciphertext-policy attribute-based encryption Journal:IEEE Transactions on Information Forensics and Security | 2015 | ||
k-Times Attribute-Based Anonymous Access Control for Cloud Computing Journal:IEEE Transactions on Computers | 2015 | ||
Linkable ring signature with unconditional anonymity Journal:IEEE Transactions on Knowledge and Data Engineering | 2014 | ||
New insight to preserve online survey accuracy and privacy in big data era Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2014 | ||
Online/offline ring signature scheme Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2009 | ||
PPDCP-ABE: Privacy-preserving decentralized ciphertext-policy attribute-based encryption Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2014 | ||
Realizing fully secure unrestricted ID-based ring signature in the standard model based on HIBE Journal:IEEE Transactions on Information Forensics and Security | 2013 | ||
Short generic transformation to strongly unforgeable signature in the standard model Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2010 | ||
Threshold ring signature without random oracles Proceeding/Conference:Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011 | 2011 | ||
Time-bound anonymous authentication for roaming networks Journal:IEEE Transactions on Information Forensics and Security | 2015 |
