Computer Science: Conference papers Collection home page

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 1101 to 1120 of 3037
TitleAuthor(s)Issue Date
An adaptively CCA-secure ciphertext-policy attribute-based proxy re-encryption for cloud data sharing
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014
An efficient KP-ABE with short ciphertexts in prime order groups under standard assumption
Proceeding/Conference:ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security
2017
Privacy-enhanced keyword search in clouds
Proceeding/Conference:Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013
2013
Efficient semi-static secure broadcast encryption scheme
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014
PEVTS: Privacy-preserving electric vehicles test-bedding scheme
Proceeding/Conference:Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS
2016
Public-key encryption resilient against linear related-key attacks revisited
Proceeding/Conference:Proceedings - 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014
2015
Verifiable and anonymous encryption in asymmetric bilinear maps
Proceeding/Conference:Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013
2013
Anonymous signcryption against linear related-key attacks
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013
Relations among privacy notions for signcryption and key invisible "sign-then-encrypt"
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013
Server-aided signatures verification secure against collusion attack
Proceeding/Conference:Information Security Technical Report
2013
Fairness in concurrent signatures revisited
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013
PERM: Practical reputation-based blacklisting without TTPs
Proceeding/Conference:Proceedings of the ACM Conference on Computer and Communications Security
2012
Perfect ambiguous optimistic fair exchange
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012
Enhancing location privacy for electric vehicles (at the right time)
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012
Efficient escrow-free identity-based signature
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012
Privacy-preserved access control for cloud computing
Proceeding/Conference:Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011
2011
Proof-of-knowledge of representation of committed value and its applications
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010
Short generic transformation to strongly unforgeable signature in the standard model
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010
Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2018
Lattice-based universal accumulator with nonmembership arguments
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2018
Collection's Items (Sorted by Submit Date in Descending order): 1101 to 1120 of 3037