History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 199 total

Asynchronous Byzantine Agreement with optimal resilience. (English)
Distributed ComputingDistributed Computing 27, N0. 2, 111-146(2014)
WorldCat.org
1
Efficient Lattice HIBE in the Standard Model with Shorter Public Parameters. (English)
ICT-EurAsia, 542-553(2014)
WorldCat.org
2
Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme. (English)
ICT-EurAsia, 564-575(2014)
WorldCat.org
3
Efficient, pairing-free, authenticated identity based key agreement in a single round. (English)
Susilo, Willy (ed.) et al., Provable security. 7th international conference, ProvSec 2013, Melaka, Malaysia, October 23‒25, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41226-4/pbk). Lecture Notes in Computer Science 8209, 38-58 (2013).
WorldCat.org
4
Anonymous Identity-Based Identification Scheme in Ad-Hoc Groups without Pairings. (English)
SPACE, 130-146(2013)
WorldCat.org
5
Identity-Based Identification Schemes from ID-KEMs. (English)
SPACE, 111-129(2013)
WorldCat.org
6
On the trade-off between network connectivity, round complexity, and communication complexity of reliable message transmission. (English)
J. ACM 59, No. 5, Paper No. 1, 35 p. (2012).
WorldCat.org
7
Compact stateful encryption schemes with ciphertext verifiability. (English)
Hanaoka, Goichiro (ed.) et al., Advances in information and computer security. 7th international workshop on security, IWSEC 2012, Fukuoka, Japan, November 7‒9, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34116-8/pbk). Lecture Notes in Computer Science 7631, 87-104 (2012).
WorldCat.org
8
Optimal parameters for efficient two-party computation protocols. (English)
Askoxylakis, Ioannis (ed.) et al., Information security theory and practice. Security, privacy and trust in computing systems and ambient intelligent ecosystems. 6th IFIP WG 11.2 international workshop, WISTP 2012, Egham, UK, June 20‒22, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30954-0/pbk). Lecture Notes in Computer Science 7322, 128-143 (2012).
WorldCat.org
9
ID based signcryption scheme in standard model. (English)
Takagi, Tsuyoshi (ed.) et al., Provable security. 6th international conference, ProvSec 2012, Chengdu, China, September 26‒28, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33271-5/pbk). Lecture Notes in Computer Science 7496, 35-52 (2012).
WorldCat.org
10
Deterministic identity based signature scheme and its application for aggregate signatures. (English)
Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9‒11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 280-293 (2012).
WorldCat.org
11
An efficient IND-CCA2 secure variant of the Niederreiter encryption scheme in the standard model. (English)
Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9‒11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 166-179 (2012).
WorldCat.org
12
Cache me if you can: capacitated selfish replication games. (English)
Fernández-Baca, David (ed.), LATIN 2012: Theoretical informatics. 10th Latin American symposium, Arequipa, Peru, April 16‒20, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29343-6/pbk). Lecture Notes in Computer Science 7256, 420-432 (2012).
WorldCat.org
13
A code-based 1-out-of-N oblivious transfer based on mceliece assumptions. (English)
Ryan, Mark D. (ed.) et al., Information security practice and experience. 8th international conference, ISPEC 2012, Hangzhou, China, April 9‒12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29100-5/pbk). Lecture Notes in Computer Science 7232, 144-157 (2012).
WorldCat.org
14
A Navigation Algorithm Inspired by Human Navigation. (English)
ASONAM, 1309-1314(2012)
WorldCat.org
15
Group key establishment (GKE): Two/three party key exchange to GKE. (English)
IEEE ANTS, 61-66(2012)
WorldCat.org
16
Obstacles Incentivize Human Learning: A Network Theoretic Study. (English)
ASONAM, 1295-1300(2012)
WorldCat.org
17
Variants of spreading messages. (English)
J. Graph Algorithms Appl. 15, No. 5, 683-699 (2011).
WorldCat.org
18
Identity based ring signcryption schemes revisited. (English)
J. Math-for-Ind. 3, No. A, 33-46 (2011).
WorldCat.org
19
Attribute based signatures for bounded multi-level threshold circuits. (English)
Camenisch, Jan (ed.) et al., Public key infrastructures, services and applications. 7th European workshop, EuroPKI 2010, Athens, Greece, September 23‒24, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-22632-8/pbk). Lecture Notes in Computer Science 6711, 141-154 (2011).
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 199 total

Valid XHTML 1.0 Transitional Valid CSS!