Found: 11
Select item for more details and to access through your institution.
Design and implementation of privacy preserving billing protocol for smart grid.
- Published in:
- Journal of Supercomputing, 2013, v. 66, n. 2, p. 841, doi. 10.1007/s11227-013-0905-z
- By:
- Publication type:
- Article
Date attachable offline electronic cash scheme.
- Published in:
- 2014
- By:
- Publication type:
- journal article
A Lattice-Based Group Authentication Scheme.
- Published in:
- Applied Sciences (2076-3417), 2018, v. 8, n. 6, p. 987, doi. 10.3390/app8060987
- By:
- Publication type:
- Article
A Multiple End-Devices Authentication Scheme for LoRaWAN.
- Published in:
- Electronics (2079-9292), 2022, v. 11, n. 5, p. 797, doi. 10.3390/electronics11050797
- By:
- Publication type:
- Article
Privacy enhancement for fair PayWord-based micropayment.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 5, p. 380, doi. 10.1002/sec.672
- By:
- Publication type:
- Article
Privacy protection for vehicular ad hoc networks by using an efficient revocable message authentication scheme.
- Published in:
- Security & Communication Networks, 2012, v. 5, n. 5, p. 462, doi. 10.1002/sec.328
- By:
- Publication type:
- Article
Multi-Keyword Searchable Identity-Based Proxy Re-Encryption from Lattices.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 18, p. 3830, doi. 10.3390/math11183830
- By:
- Publication type:
- Article
Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks.
- Published in:
- International Journal of Information Security, 2020, v. 19, n. 3, p. 245, doi. 10.1007/s10207-019-00476-5
- By:
- Publication type:
- Article
An authenticated re‐encryption scheme for secure file transfer in named data networks.
- Published in:
- International Journal of Communication Systems, 2018, v. 31, n. 11, p. 1, doi. 10.1002/dac.3571
- By:
- Publication type:
- Article
On the Anonymity of Multi-Receiver Identity-Based Encryption Based on Fujisaki–Okamoto Transformation.
- Published in:
- International Journal of Foundations of Computer Science, 2019, v. 30, n. 4, p. 493, doi. 10.1142/S0129054119400094
- By:
- Publication type:
- Article
Anonymous Multireceiver Identity-Based Encryption against Chosen-Ciphertext Attacks with Tight Reduction in the Standard Model.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/5519721
- By:
- Publication type:
- Article