History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 221 total

Lattice-based identity-based resplittable threshold public key encryption scheme. (English)
Int. J. Comput. Math. 93, No. 2, 289-307 (2016).
WorldCat.org
1
Stronger public key encryption system withstanding RAM scraper like attacks. (English)
Security and Communication Networks 9, N0. 12, 1650-1662(2016)
WorldCat.org
2
Forward-secure authenticated symmetric key exchange protocol: new security model and secure construction. (English)
Au, Man-Ho (ed.) et al., Provable security. 9th international conference, ProvSec 2015, Kanazawa, Japan, November 24‒26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-26058-7/pbk; 978-3-319-26059-4/ebook). Lecture Notes in Computer Science 9451, 149-166 (2015).
WorldCat.org
3
Constant size ring signature without random oracle. (English)
Foo, Ernest (ed.) et al., Information security and privacy. 20th Australasian conference, ACISP 2015, Brisbane, QLD, Australia, June 29 ‒ July 1, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-19961-0/pbk; 978-3-319-19962-7/ebook). Lecture Notes in Computer Science 9144, 230-247 (2015).
WorldCat.org
4
Efficient asynchronous verifiable secret sharing and multiparty computation. (English)
J. Cryptology 28, No. 1, 49-109 (2015).
WorldCat.org
5
Practical IBE Secure under CBDH - Encrypting Without Pairing. (English)
SECRYPT, 251-258(2015)
WorldCat.org
6
Certificateless Proxy Re-Encryption Without Pairing: Revisited. (English)
SCC@ASIACCS, 41-52(2015)
WorldCat.org
7
Efficient code based hybrid and deterministic encryptions in the standard model. (English)
Lee, Hyang-Sook (ed.) et al., Information security and cryptology ‒ ICISC 2013. 16th international conference, Seoul, Korea, November 27‒29, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12159-8/pbk; 978-3-319-12160-4/ebook). Lecture Notes in Computer Science 8565, 517-535 (2014).
WorldCat.org
8
A provably secure signature and signcryption scheme using the hardness assumptions in coding theory. (English)
Lee, Hyang-Sook (ed.) et al., Information security and cryptology ‒ ICISC 2013. 16th international conference, Seoul, Korea, November 27‒29, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12159-8/pbk; 978-3-319-12160-4/ebook). Lecture Notes in Computer Science 8565, 342-362 (2014).
WorldCat.org
9
Lattice based identity based unidirectional proxy re-encryption scheme. (English)
Chakraborty, Rajat Subhra (ed.) et al., Security, privacy, and applied cryptography engineering. 4th international conference, SPACE 2014, Pune, India, October 18‒22, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-12059-1/pbk). Lecture Notes in Computer Science 8804, 76-91 (2014).
WorldCat.org
10
Cryptanalysis of unidirectional proxy re-encryption scheme. (English)
Linawati (ed.) et al., Information and communication technology. Second IFIP TC5/8 international conference, ICT-Eurasia 2014, Bali, Indonesia, April 14‒17, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55031-7/pbk). Lecture Notes in Computer Science 8407, 564-575 (2014).
WorldCat.org
11
Efficient lattice HIBE in the standard model with shorter public parameters. (English)
Linawati (ed.) et al., Information and communication technology. Second IFIP TC5/8 international conference, ICT-Eurasia 2014, Bali, Indonesia, April 14‒17, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55031-7/pbk). Lecture Notes in Computer Science 8407, 542-553 (2014).
WorldCat.org
12
Asynchronous Byzantine agreement with optimal resilience. (English)
Distrib. Comput. 27, No. 2, 111-146 (2014).
WorldCat.org
13
Pairing-free Single Round Certificateless and Identity Based Authenticated Key Exchange Protocols. (English)
SECRYPT, 67-78(2014)
WorldCat.org
14
Certificateless and Identity based Authenticated Key Exchange Protocols. (English)
ICETE (Selected Papers), 255-277(2014)
WorldCat.org
15
Anonymous identity-based identification scheme in ad-hoc groups without pairings. (English)
Gierlichs, Benedikt (ed.) et al., Security, privacy, and applied cryptography engineering. Third international conference, SPACE 2013, Kharagpur, India, October 19‒23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41223-3/pbk). Lecture Notes in Computer Science 8204, 130-146 (2013).
WorldCat.org
16
Identity-based identification schemes from ID-kems. (English)
Gierlichs, Benedikt (ed.) et al., Security, privacy, and applied cryptography engineering. Third international conference, SPACE 2013, Kharagpur, India, October 19‒23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41223-3/pbk). Lecture Notes in Computer Science 8204, 111-129 (2013).
WorldCat.org
17
Efficient, pairing-free, authenticated identity based key agreement in a single round. (English)
Susilo, Willy (ed.) et al., Provable security. 7th international conference, ProvSec 2013, Melaka, Malaysia, October 23‒25, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41226-4/pbk). Lecture Notes in Computer Science 8209, 38-58 (2013).
WorldCat.org
18
Exploiting processor heterogeneity for energy efficient context inference on mobile phones. (English)
HotPower@SOSP, 9:1-9:5(2013)
WorldCat.org
19
Lattice Based Efficient Threshold Public Key Encryption Scheme. (English)
JoWUA 4, N0. 4, 93-107(2013)
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 221 total

Valid XHTML 1.0 Transitional Valid CSS!