History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 217 total

Constant size ring signature without random oracle. (English)
Foo, Ernest (ed.) et al., Information security and privacy. 20th Australasian conference, ACISP 2015, Brisbane, QLD, Australia, June 29 ‒ July 1, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-19961-0/pbk; 978-3-319-19962-7/ebook). Lecture Notes in Computer Science 9144, 230-247 (2015).
WorldCat.org
1
Efficient asynchronous verifiable secret sharing and multiparty computation. (English)
J. Cryptology 28, No. 1, 49-109 (2015).
WorldCat.org
2
Practical IBE Secure under CBDH - Encrypting Without Pairing. (English)
SECRYPT, 251-258(2015)
WorldCat.org
3
Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction. (English)
ProvSec, 149-166(2015)
WorldCat.org
4
Certificateless Proxy Re-Encryption Without Pairing: Revisited. (English)
SCC@ASIACCS, 41-52(2015)
WorldCat.org
5
Efficient code based hybrid and deterministic encryptions in the standard model. (English)
Lee, Hyang-Sook (ed.) et al., Information security and cryptology ‒ ICISC 2013. 16th international conference, Seoul, Korea, November 27‒29, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12159-8/pbk; 978-3-319-12160-4/ebook). Lecture Notes in Computer Science 8565, 517-535 (2014).
WorldCat.org
6
A provably secure signature and signcryption scheme using the hardness assumptions in coding theory. (English)
Lee, Hyang-Sook (ed.) et al., Information security and cryptology ‒ ICISC 2013. 16th international conference, Seoul, Korea, November 27‒29, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12159-8/pbk; 978-3-319-12160-4/ebook). Lecture Notes in Computer Science 8565, 342-362 (2014).
WorldCat.org
7
Lattice based identity based unidirectional proxy re-encryption scheme. (English)
Chakraborty, Rajat Subhra (ed.) et al., Security, privacy, and applied cryptography engineering. 4th international conference, SPACE 2014, Pune, India, October 18‒22, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-12059-1/pbk). Lecture Notes in Computer Science 8804, 76-91 (2014).
WorldCat.org
8
Cryptanalysis of unidirectional proxy re-encryption scheme. (English)
Linawati (ed.) et al., Information and communication technology. Second IFIP TC5/8 international conference, ICT-Eurasia 2014, Bali, Indonesia, April 14‒17, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55031-7/pbk). Lecture Notes in Computer Science 8407, 564-575 (2014).
WorldCat.org
9
Efficient lattice HIBE in the standard model with shorter public parameters. (English)
Linawati (ed.) et al., Information and communication technology. Second IFIP TC5/8 international conference, ICT-Eurasia 2014, Bali, Indonesia, April 14‒17, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55031-7/pbk). Lecture Notes in Computer Science 8407, 542-553 (2014).
WorldCat.org
10
Asynchronous Byzantine agreement with optimal resilience. (English)
Distrib. Comput. 27, No. 2, 111-146 (2014).
WorldCat.org
11
Pairing-free Single Round Certificateless and Identity Based Authenticated Key Exchange Protocols. (English)
SECRYPT, 67-78(2014)
WorldCat.org
12
Anonymous identity-based identification scheme in ad-hoc groups without pairings. (English)
Gierlichs, Benedikt (ed.) et al., Security, privacy, and applied cryptography engineering. Third international conference, SPACE 2013, Kharagpur, India, October 19‒23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41223-3/pbk). Lecture Notes in Computer Science 8204, 130-146 (2013).
WorldCat.org
13
Identity-based identification schemes from ID-kems. (English)
Gierlichs, Benedikt (ed.) et al., Security, privacy, and applied cryptography engineering. Third international conference, SPACE 2013, Kharagpur, India, October 19‒23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41223-3/pbk). Lecture Notes in Computer Science 8204, 111-129 (2013).
WorldCat.org
14
Efficient, pairing-free, authenticated identity based key agreement in a single round. (English)
Susilo, Willy (ed.) et al., Provable security. 7th international conference, ProvSec 2013, Melaka, Malaysia, October 23‒25, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41226-4/pbk). Lecture Notes in Computer Science 8209, 38-58 (2013).
WorldCat.org
15
Lattice Based Efficient Threshold Public Key Encryption Scheme. (English)
JoWUA 4, N0. 4, 93-107(2013)
WorldCat.org
16
Exploiting processor heterogeneity for energy efficient context inference on mobile phones. (English)
HotPower@SOSP, 9:1-9:5(2013)
WorldCat.org
17
On the trade-off between network connectivity, round complexity, and communication complexity of reliable message transmission. (English)
J. ACM 59, No. 5, Paper No. 1, 35 p. (2012).
WorldCat.org
18
Compact stateful encryption schemes with ciphertext verifiability. (English)
Hanaoka, Goichiro (ed.) et al., Advances in information and computer security. 7th international workshop on security, IWSEC 2012, Fukuoka, Japan, November 7‒9, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34116-8/pbk). Lecture Notes in Computer Science 7631, 87-104 (2012).
WorldCat.org
19
Optimal parameters for efficient two-party computation protocols. (English)
Askoxylakis, Ioannis (ed.) et al., Information security theory and practice. Security, privacy and trust in computing systems and ambient intelligent ecosystems. 6th IFIP WG 11.2 international workshop, WISTP 2012, Egham, UK, June 20‒22, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30954-0/pbk). Lecture Notes in Computer Science 7322, 128-143 (2012).
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 217 total

Valid XHTML 1.0 Transitional Valid CSS!