Found: 11
Select item for more details and to access through your institution.
Continuous Leakage-Resilient Certificate-Based Encryption Scheme Without Bilinear Pairings.
- Published in:
- Computer Journal, 2020, v. 63, n. 4, p. 508, doi. 10.1093/comjnl/bxz085
- By:
- Publication type:
- Article
Updatable Lossy Trapdoor Functions Under Consecutive Leakage.
- Published in:
- Computer Journal, 2020, v. 63, n. 4, p. 648, doi. 10.1093/comjnl/bxz119
- By:
- Publication type:
- Article
A (Zero-Knowledge) Vector Commitment with Sum Binding and its Applications.
- Published in:
- Computer Journal, 2020, v. 63, n. 4, p. 633, doi. 10.1093/comjnl/bxz115
- By:
- Publication type:
- Article
Server-aided Revocable IBE with Identity Reuse.
- Published in:
- Computer Journal, 2020, v. 63, n. 4, p. 620, doi. 10.1093/comjnl/bxz114
- By:
- Publication type:
- Article
Intrusion Detection Over Encrypted Network Data.
- Published in:
- Computer Journal, 2020, v. 63, n. 4, p. 604, doi. 10.1093/comjnl/bxz111
- By:
- Publication type:
- Article
New Security Risk Value Estimate Method for Android Applications.
- Published in:
- Computer Journal, 2020, v. 63, n. 4, p. 593, doi. 10.1093/comjnl/bxz109
- By:
- Publication type:
- Article
Secure Computing Resource Allocation Framework For Open Fog Computing.
- Published in:
- Computer Journal, 2020, v. 63, n. 4, p. 567, doi. 10.1093/comjnl/bxz108
- By:
- Publication type:
- Article
Resistance of IID Noise in Differentially Private Schemes for Trajectory Publishing.
- Published in:
- Computer Journal, 2020, v. 63, n. 4, p. 549, doi. 10.1093/comjnl/bxz097
- By:
- Publication type:
- Article
A New Construction for Linkable Secret Handshake.
- Published in:
- Computer Journal, 2020, v. 63, n. 4, p. 536, doi. 10.1093/comjnl/bxz095
- By:
- Publication type:
- Article
Black-Box Accountable Authority Identity-Based Revocation System.
- Published in:
- Computer Journal, 2020, v. 63, n. 4, p. 525, doi. 10.1093/comjnl/bxz092
- By:
- Publication type:
- Article
On the Security of LWE Cryptosystem against Subversion Attacks.
- Published in:
- Computer Journal, 2020, v. 63, n. 4, p. 495, doi. 10.1093/comjnl/bxz084
- By:
- Publication type:
- Article