Found: 13
Select item for more details and to access through your institution.
A new Tseng method for supply chain network equilibrium model.
- Published in:
- Mathematical Biosciences & Engineering, 2023, v. 20, n. 5, p. 7828, doi. 10.3934/mbe.2023338
- By:
- Publication type:
- Article
An Efficient Biometric Identity Based Signature Scheme.
- Published in:
- KSII Transactions on Internet & Information Systems, 2013, v. 7, n. 8, p. 2010, doi. 10.3837/tiis.2013.08.015
- By:
- Publication type:
- Article
New Constructions of Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Computing.
- Published in:
- KSII Transactions on Internet & Information Systems, 2013, v. 7, n. 5, p. 1343, doi. 10.3837/tiis.2013.05.023
- By:
- Publication type:
- Article
New Constructions of Identity-based Broadcast Encryption without Random Oracles.
- Published in:
- KSII Transactions on Internet & Information Systems, 2011, v. 5, n. 2, p. 428, doi. 10.3837/tiis.2011.02.011
- By:
- Publication type:
- Article
Identity-based Threshold Broadcast Encryption in the Standard Model.
- Published in:
- KSII Transactions on Internet & Information Systems, 2010, v. 4, n. 3, p. 400, doi. 10.3837/tiis.2010.06.012
- By:
- Publication type:
- Article
Improving Security in Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing.
- Published in:
- KSII Transactions on Internet & Information Systems, 2019, v. 13, n. 5, p. 2768, doi. 10.3837/tiis.2019.05.029
- By:
- Publication type:
- Article
Privacy-Preserving and Secure Sharing of PHR in the Cloud.
- Published in:
- Journal of Medical Systems, 2016, v. 40, n. 12, p. 1, doi. 10.1007/s10916-016-0595-1
- By:
- Publication type:
- Article
Novel Leakage-Resilient Attribute-Based Encryption from Hash Proof System.
- Published in:
- Computer Journal, 2017, v. 60, n. 4, p. 541, doi. 10.1093/comjnl/bxw070
- By:
- Publication type:
- Article
Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys.
- Published in:
- Computer Journal, 2016, v. 59, n. 4, p. 452, doi. 10.1093/comjnl/bxv059
- By:
- Publication type:
- Article
A Key-Policy Attribute-Based Broadcast Encryption.
- Published in:
- International Arab Journal of Information Technology (IAJIT), 2013, v. 10, n. 5, p. 444
- By:
- Publication type:
- Article
An Efficient Group Key Agreement Scheme for Mobile Ad-Hoc Networks.
- Published in:
- International Arab Journal of Information Technology (IAJIT), 2013, v. 10, n. 1, p. 10
- By:
- Publication type:
- Article
Hierarchical Identity-Based Encryption with Constant-Size Private Keys.
- Published in:
- ETRI Journal, 2012, v. 34, n. 1, p. 142, doi. 10.4218/etrij.12.0211.0140
- By:
- Publication type:
- Article
Automatic classification and segmentation of single-molecule fluorescence time traces with deep learning.
- Published in:
- Nature Communications, 2020, v. 11, n. 1, p. N.PAG, doi. 10.1038/s41467-020-19673-1
- By:
- Publication type:
- Article