Computer Science: Conference papers Collection home page

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 141 to 160 of 963
TitleAuthor(s)Issue Date
Towards a cryptographic treatment of publish/subscribe systems
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010
Efficient completely non-malleable and RKA secure public key encryptions
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2016
How to construct identity-based signatures without the key escrow problem
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010
Escrowed linkability of ring signatures and its applications
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2006
Proxy ring signature: Formal definitions, efficient construction and new variant
Proceeding/Conference:2006 International Conference on Computational Intelligence and Security, ICCIAS 2006
2007
Sanitizable signatures revisited
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2008
Constant-size id-based linkable and revocable-iff-linked ring signature
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2006
Group signature where group manager, members and Open Authority are identity-based
Proceeding/Conference:Lecture Notes in Computer Science
2005
Fast and proven secure blind identity-based signcryption from pairings
Proceeding/Conference:Lecture Notes in Computer Science
2005
(Convertible) undeniable signatures without random oracles
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2007
RingCT 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency Monero
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2017
Time-based direct revocable ciphertext-policy attribute-based encryption with short revocation list
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2018
Towards anonymous ciphertext indistinguishability with identity leakage
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013
Threshold ring signature without random oracles
Proceeding/Conference:Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011
2011
Concurrent signatures with fully negotiable binding control
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2011
Efficient non-interactive range proof
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2009
Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2011
Ring signatures without random oracles
Proceeding/Conference:Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
2006
ID-based ring signature scheme secure in the standard model
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2006
Certificate based (linkable) ring signature
Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2007
Collection's Items (Sorted by Submit Date in Descending order): 141 to 160 of 963