History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 219 total

Lattice-based identity-based resplittable threshold public key encryption scheme. (English)
Int. J. Comput. Math. 93, No. 2, 289-307 (2016).
WorldCat.org
1
Forward-secure authenticated symmetric key exchange protocol: new security model and secure construction. (English)
Au, Man-Ho (ed.) et al., Provable security. 9th international conference, ProvSec 2015, Kanazawa, Japan, November 24‒26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-26058-7/pbk; 978-3-319-26059-4/ebook). Lecture Notes in Computer Science 9451, 149-166 (2015).
WorldCat.org
2
Constant size ring signature without random oracle. (English)
Foo, Ernest (ed.) et al., Information security and privacy. 20th Australasian conference, ACISP 2015, Brisbane, QLD, Australia, June 29 ‒ July 1, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-19961-0/pbk; 978-3-319-19962-7/ebook). Lecture Notes in Computer Science 9144, 230-247 (2015).
WorldCat.org
3
Efficient asynchronous verifiable secret sharing and multiparty computation. (English)
J. Cryptology 28, No. 1, 49-109 (2015).
WorldCat.org
4
Practical IBE Secure under CBDH - Encrypting Without Pairing. (English)
SECRYPT, 251-258(2015)
WorldCat.org
5
Certificateless Proxy Re-Encryption Without Pairing: Revisited. (English)
SCC@ASIACCS, 41-52(2015)
WorldCat.org
6
Efficient code based hybrid and deterministic encryptions in the standard model. (English)
Lee, Hyang-Sook (ed.) et al., Information security and cryptology ‒ ICISC 2013. 16th international conference, Seoul, Korea, November 27‒29, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12159-8/pbk; 978-3-319-12160-4/ebook). Lecture Notes in Computer Science 8565, 517-535 (2014).
WorldCat.org
7
A provably secure signature and signcryption scheme using the hardness assumptions in coding theory. (English)
Lee, Hyang-Sook (ed.) et al., Information security and cryptology ‒ ICISC 2013. 16th international conference, Seoul, Korea, November 27‒29, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12159-8/pbk; 978-3-319-12160-4/ebook). Lecture Notes in Computer Science 8565, 342-362 (2014).
WorldCat.org
8
Lattice based identity based unidirectional proxy re-encryption scheme. (English)
Chakraborty, Rajat Subhra (ed.) et al., Security, privacy, and applied cryptography engineering. 4th international conference, SPACE 2014, Pune, India, October 18‒22, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-12059-1/pbk). Lecture Notes in Computer Science 8804, 76-91 (2014).
WorldCat.org
9
Cryptanalysis of unidirectional proxy re-encryption scheme. (English)
Linawati (ed.) et al., Information and communication technology. Second IFIP TC5/8 international conference, ICT-Eurasia 2014, Bali, Indonesia, April 14‒17, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55031-7/pbk). Lecture Notes in Computer Science 8407, 564-575 (2014).
WorldCat.org
10
Efficient lattice HIBE in the standard model with shorter public parameters. (English)
Linawati (ed.) et al., Information and communication technology. Second IFIP TC5/8 international conference, ICT-Eurasia 2014, Bali, Indonesia, April 14‒17, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55031-7/pbk). Lecture Notes in Computer Science 8407, 542-553 (2014).
WorldCat.org
11
Asynchronous Byzantine agreement with optimal resilience. (English)
Distrib. Comput. 27, No. 2, 111-146 (2014).
WorldCat.org
12
Pairing-free Single Round Certificateless and Identity Based Authenticated Key Exchange Protocols. (English)
SECRYPT, 67-78(2014)
WorldCat.org
13
Certificateless and Identity based Authenticated Key Exchange Protocols. (English)
ICETE (Selected Papers), 255-277(2014)
WorldCat.org
14
Anonymous identity-based identification scheme in ad-hoc groups without pairings. (English)
Gierlichs, Benedikt (ed.) et al., Security, privacy, and applied cryptography engineering. Third international conference, SPACE 2013, Kharagpur, India, October 19‒23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41223-3/pbk). Lecture Notes in Computer Science 8204, 130-146 (2013).
WorldCat.org
15
Identity-based identification schemes from ID-kems. (English)
Gierlichs, Benedikt (ed.) et al., Security, privacy, and applied cryptography engineering. Third international conference, SPACE 2013, Kharagpur, India, October 19‒23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41223-3/pbk). Lecture Notes in Computer Science 8204, 111-129 (2013).
WorldCat.org
16
Efficient, pairing-free, authenticated identity based key agreement in a single round. (English)
Susilo, Willy (ed.) et al., Provable security. 7th international conference, ProvSec 2013, Melaka, Malaysia, October 23‒25, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41226-4/pbk). Lecture Notes in Computer Science 8209, 38-58 (2013).
WorldCat.org
17
Exploiting processor heterogeneity for energy efficient context inference on mobile phones. (English)
HotPower@SOSP, 9:1-9:5(2013)
WorldCat.org
18
Lattice Based Efficient Threshold Public Key Encryption Scheme. (English)
JoWUA 4, N0. 4, 93-107(2013)
WorldCat.org
19
On the trade-off between network connectivity, round complexity, and communication complexity of reliable message transmission. (English)
J. ACM 59, No. 5, Article No. 22, 35 p. (2012).
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 219 total

Valid XHTML 1.0 Transitional Valid CSS!