History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 194 total

Efficient, pairing-free, authenticated identity based key agreement in a single round. (English)
Susilo, Willy (ed.) et al., Provable security. 7th international conference, ProvSec 2013, Melaka, Malaysia, October 23‒25, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41226-4/pbk). Lecture Notes in Computer Science 8209, 38-58 (2013).
WorldCat.org
1
Identity-Based Identification Schemes from ID-KEMs. (English)
SPACE, 111-129(2013)
WorldCat.org
2
Anonymous Identity-Based Identification Scheme in Ad-Hoc Groups without Pairings. (English)
SPACE, 130-146(2013)
WorldCat.org
3
Compact stateful encryption schemes with ciphertext verifiability. (English)
Hanaoka, Goichiro (ed.) et al., Advances in information and computer security. 7th international workshop on security, IWSEC 2012, Fukuoka, Japan, November 7‒9, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34116-8/pbk). Lecture Notes in Computer Science 7631, 87-104 (2012).
WorldCat.org
4
Optimal parameters for efficient two-party computation protocols. (English)
Askoxylakis, Ioannis (ed.) et al., Information security theory and practice. Security, privacy and trust in computing systems and ambient intelligent ecosystems. 6th IFIP WG 11.2 international workshop, WISTP 2012, Egham, UK, June 20‒22, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30954-0/pbk). Lecture Notes in Computer Science 7322, 128-143 (2012).
WorldCat.org
5
ID based signcryption scheme in standard model. (English)
Takagi, Tsuyoshi (ed.) et al., Provable security. 6th international conference, ProvSec 2012, Chengdu, China, September 26‒28, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33271-5/pbk). Lecture Notes in Computer Science 7496, 35-52 (2012).
WorldCat.org
6
Deterministic identity based signature scheme and its application for aggregate signatures. (English)
Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9‒11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 280-293 (2012).
WorldCat.org
7
An efficient IND-CCA2 secure variant of the Niederreiter encryption scheme in the standard model. (English)
Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9‒11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 166-179 (2012).
WorldCat.org
8
Cache me if you can: capacitated selfish replication games. (English)
Fernández-Baca, David (ed.), LATIN 2012: Theoretical informatics. 10th Latin American symposium, Arequipa, Peru, April 16‒20, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29343-6/pbk). Lecture Notes in Computer Science 7256, 420-432 (2012).
WorldCat.org
9
A code-based 1-out-of-N oblivious transfer based on mceliece assumptions. (English)
Ryan, Mark D. (ed.) et al., Information security practice and experience. 8th international conference, ISPEC 2012, Hangzhou, China, April 9‒12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29100-5/pbk). Lecture Notes in Computer Science 7232, 144-157 (2012).
WorldCat.org
10
A Navigation Algorithm Inspired by Human Navigation. (English)
ASONAM, 1309-1314(2012)
WorldCat.org
11
Obstacles Incentivize Human Learning: A Network Theoretic Study. (English)
ASONAM, 1295-1300(2012)
WorldCat.org
12
Variants of spreading messages. (English)
J. Graph Algorithms Appl. 15, No. 5, 683-699 (2011).
WorldCat.org
13
Identity based ring signcryption schemes revisited. (English)
J. Math-for-Ind. 3, No. A, 33-46 (2011).
WorldCat.org
14
Attribute based signatures for bounded multi-level threshold circuits. (English)
Camenisch, Jan (ed.) et al., Public key infrastructures, services and applications. 7th European workshop, EuroPKI 2010, Athens, Greece, September 23‒24, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-22632-8/pbk). Lecture Notes in Computer Science 6711, 141-154 (2011).
WorldCat.org
15
Identity-based deterministic signature scheme without forking-lemma. (English)
Iwata, Tetsu (ed.) et al., Advances in information and computer security. 6th international workshop, IWSEC 2011, Tokyo, Japan, November 8‒10, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25140-5/pbk). Lecture Notes in Computer Science 7038, 79-95 (2011).
WorldCat.org
16
Identity based online/offline encryption and signcryption schemes revisited. (English)
Joye, Marc (ed.) et al., Security aspects in information technology. First international conference, InfoSecHiComNet 2011, Haldia, India, October 19‒22, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-24585-5/pbk). Lecture Notes in Computer Science 7011, 111-127 (2011).
WorldCat.org
17
Secure message transmission in asynchronous networks. (English)
J. Parallel Distrib. Comput. 71, No. 8, 1067-1074 (2011).
WorldCat.org
18
Communication optimal multi-valued asynchronous Byzantine agreement with optimal resilience. (English)
Fehr, Serge (ed.), Information theoretic security. 5th international conference, ICITS 2011, Amsterdam, The Netherlands, May 21‒24, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20727-3/pbk). Lecture Notes in Computer Science 6673, 206-226 (2011).
WorldCat.org
19
A polynomial time algorithm for longest paths in biconvex graphs. (English)
Katoh, Naoki (ed.) et al., WALCOM: Algorithms and computation. 5th international workshop, WALCOM 2011, New Delhi, India, February 18‒20, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19093-3/pbk). Lecture Notes in Computer Science 6552, 191-201 (2011).
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 194 total

Valid XHTML 1.0 Transitional Valid CSS!