Found: 50
Select item for more details and to access through your institution.
ID-Based Ring Signature against Continual Side Channel Attack.
- Published in:
- Symmetry (20738994), 2023, v. 15, n. 1, p. 179, doi. 10.3390/sym15010179
- By:
- Publication type:
- Article
New Construction of Short Certificate-Based Signature against Existential Forgery Attacks.
- Published in:
- KSII Transactions on Internet & Information Systems, 2017, v. 11, n. 7, p. 3629, doi. 10.3837/tiis.2017.07.018
- By:
- Publication type:
- Article
Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing.
- Published in:
- KSII Transactions on Internet & Information Systems, 2016, v. 10, n. 7, p. 3339, doi. 10.3837/tiis.2016.07.026
- By:
- Publication type:
- Article
Provably Secure Certificate-Based Signcryption Scheme without Pairings.
- Published in:
- KSII Transactions on Internet & Information Systems, 2014, v. 8, n. 7, p. 2554, doi. 10.3837/tiis.2014.07.020
- By:
- Publication type:
- Article
Provably Secure Forward Secure Certificateless Proxy Signature Scheme.
- Published in:
- KSII Transactions on Internet & Information Systems, 2013, v. 7, n. 8, p. 1972, doi. 10.3837/tiis.2013.08.013
- By:
- Publication type:
- Article
Certificate-Based Encryption Scheme without Pairing.
- Published in:
- KSII Transactions on Internet & Information Systems, 2013, v. 7, n. 6, p. 1480, doi. 10.3837/tiis.2013.06.008
- By:
- Publication type:
- Article
Novel Searchable Attribute-Based Encryption for the Internet of Things.
- Published in:
- Wireless Communications & Mobile Computing, 2022, p. 1, doi. 10.1155/2022/8350006
- By:
- Publication type:
- Article
Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation.
- Published in:
- International Journal of Information Security, 2015, v. 14, n. 6, p. 487, doi. 10.1007/s10207-014-0270-9
- By:
- Publication type:
- Article
FORWARD-SECURE IDENTITY-BASED ENCRYPTION WITH DIRECT CHOSEN-CIPHERTEXT SECURITY IN THE STANDARD MODEL.
- Published in:
- Advances in Mathematics of Communications, 2017, v. 11, n. 1, p. 161, doi. 10.3934/amc.2017010
- By:
- Publication type:
- Article
AN IMPROVED CERTIFICATELESS STRONG KEY-INSULATED SIGNATURE SCHEME IN THE STANDARD MODEL.
- Published in:
- Advances in Mathematics of Communications, 2015, v. 9, n. 3, p. 353, doi. 10.3934/amc.2015.9.353
- By:
- Publication type:
- Article
Constructing designated server public key encryption with keyword search schemes withstanding keyword guessing attacks.
- Published in:
- International Journal of Communication Systems, 2019, v. 32, n. 3, p. N.PAG, doi. 10.1002/dac.3862
- By:
- Publication type:
- Article
Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage.
- Published in:
- International Journal of Communication Systems, 2017, v. 30, n. 1, p. n/a, doi. 10.1002/dac.2942
- By:
- Publication type:
- Article
Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertext.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2020, v. 24, n. 6, p. 4589, doi. 10.1007/s00500-019-04219-5
- By:
- Publication type:
- Article
A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2020, v. 24, n. 3, p. 1869, doi. 10.1007/s00500-019-04018-y
- By:
- Publication type:
- Article
Expressive attribute-based keyword search with constant-size ciphertext.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2018, v. 22, n. 15, p. 5163, doi. 10.1007/s00500-017-2701-9
- By:
- Publication type:
- Article
Certificate-Based Encryption Resilient to Continual Leakage in the Standard Model.
- Published in:
- Security & Communication Networks, 2020, p. 1, doi. 10.1155/2020/1492681
- By:
- Publication type:
- Article
Two-Party Attribute-Based Key Agreement Protocol with Constant-Size Ciphertext and Key.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/8738960
- By:
- Publication type:
- Article
Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service.
- Published in:
- KSII Transactions on Internet & Information Systems, 2019, v. 13, n. 3, p. 1523, doi. 10.3837/tiis.2019.03.023
- By:
- Publication type:
- Article
A Forward-Secure Certificate-Based Signature Scheme with Enhanced Security in the Standard Model.
- Published in:
- KSII Transactions on Internet & Information Systems, 2019, v. 13, n. 3, p. 1502, doi. 10.3837/tiis.2019.03.022
- By:
- Publication type:
- Article
Improving Security and Privacy-Preserving in Multi-Authorities Ciphertext-Policy Attribute-Based Encryption.
- Published in:
- KSII Transactions on Internet & Information Systems, 2018, v. 12, n. 10, p. 5100, doi. 10.3837/tiis.2018.10.025
- By:
- Publication type:
- Article
Identity-Based and Leakage-Resilient Broadcast Encryption Scheme for Cloud Storage Service.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 22, p. 11495, doi. 10.3390/app122211495
- By:
- Publication type:
- Article
Anonymous Identity Based Broadcast Encryption against Continual Side Channel Attacks in the State Partition Model.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 18, p. 9395, doi. 10.3390/app12189395
- By:
- Publication type:
- Article
Weakness and Improvement of a Certificate-Based Key-Insulated Signature in the Standard Model.
- Published in:
- Computer Journal, 2017, v. 60, n. 12, p. 1729, doi. 10.1093/comjnl/bxx031
- By:
- Publication type:
- Article
A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme.
- Published in:
- Computer Journal, 2016, v. 59, n. 7, p. 1066, doi. 10.1093/comjnl/bxv128
- By:
- Publication type:
- Article
Certificate-Based Key-Insulated Signature in the Standard Model.
- Published in:
- Computer Journal, 2016, v. 59, n. 7, p. 1029, doi. 10.1093/comjnl/bxv115
- By:
- Publication type:
- Article
A Forward-Secure Certificate-Based Signature Scheme.
- Published in:
- Computer Journal, 2015, v. 58, n. 4, p. 853, doi. 10.1093/comjnl/bxt141
- By:
- Publication type:
- Article
Semantic-Aware Visual Decomposition for Image Coding.
- Published in:
- International Journal of Computer Vision, 2023, v. 131, n. 9, p. 2333, doi. 10.1007/s11263-023-01809-7
- By:
- Publication type:
- Article
Cryptanalysis and Improvement of Batch Verification Certificateless Signature Scheme for VANETs.
- Published in:
- Wireless Personal Communications, 2020, v. 111, n. 2, p. 1255, doi. 10.1007/s11277-019-06912-y
- By:
- Publication type:
- Article
On Security of a Secure Channel Free Public Key Encryption with Conjunctive Field Keyword Search Scheme.
- Published in:
- Information Technology & Control, 2018, v. 47, n. 1, p. 56, doi. 10.5755/j01.itc.47.1.16137
- By:
- Publication type:
- Article
An Efficient Certificate-Based Authenticated Key Agreement Protocol Without Bilinear Pairing.
- Published in:
- Information Technology & Control, 2017, v. 46, n. 3, p. 345, doi. 10.5755/j01.itc.46.3.14968
- By:
- Publication type:
- Article
Improved certificate‐based signature scheme without random oracles.
- Published in:
- IET Information Security (Wiley-Blackwell), 2016, v. 10, n. 2, p. 80, doi. 10.1049/iet-ifs.2015.0188
- By:
- Publication type:
- Article
Identity-based provable data possession scheme for multi-source IoT terminal data in public cloud.
- Published in:
- Journal on Communication / Tongxin Xuebao, 2021, v. 42, n. 7, p. 52, doi. 10.11959/j.issn.1000-436x.2021077
- By:
- Publication type:
- Article
The Effect of Diabetes Management Shared Care Clinic on Glycated Hemoglobin A1c Compliance and Self-Management Abilities in Patients with Type 2 Diabetes Mellitus.
- Published in:
- International Journal of Clinical Practice, 2023, p. 1, doi. 10.1155/2023/2493634
- By:
- Publication type:
- Article
Provably secure certificate-based key-insulated signature scheme.
- Published in:
- Concurrency & Computation: Practice & Experience, 2014, v. 26, n. 8, p. 1546, doi. 10.1002/cpe.3019
- By:
- Publication type:
- Article
Hierarchical Identity-Based Online/Offline Encryption Scheme with Leakage Resilience.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/6849761
- By:
- Publication type:
- Article
Fully Secure ID-Based Signature Scheme with Continuous Leakage Resilience.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/8220259
- By:
- Publication type:
- Article
Identity-Based Online/Offline Encryption Scheme from LWE.
- Published in:
- Information (2078-2489), 2024, v. 15, n. 9, p. 539, doi. 10.3390/info15090539
- By:
- Publication type:
- Article
Efficiency and Privacy Enhancement for a Track and Trace System of RFID-Based Supply Chains.
- Published in:
- Information (2078-2489), 2015, v. 6, n. 2, p. 258, doi. 10.3390/info6020258
- By:
- Publication type:
- Article
AN EFFICIENT CERTIFICATE-BASED DESIGNATED VERIFIER SIGNATURE SCHEME.
- Published in:
- Computing & Informatics, 2016, v. 35, n. 5, p. 1210
- By:
- Publication type:
- Article
A Certificate-Based AKA Protocol Secure Against Public Key Replacement Attacks.
- Published in:
- International Arab Journal of Information Technology (IAJIT), 2019, v. 16, n. 4, p. 754
- By:
- Publication type:
- Article
Provably Secure Certificate-based Conditional Proxy Re-encryption.
- Published in:
- Journal of Information Science & Engineering, 2016, v. 32, n. 4, p. 813
- By:
- Publication type:
- Article
Efficient Certificate-Based Encryption Scheme Secure Against Key Replacement Attacks in the Standard Model.
- Published in:
- Journal of Information Science & Engineering, 2014, v. 30, n. 5, p. 1553
- By:
- Publication type:
- Article
ABKS-CSC: attribute-based keyword search with constant-size ciphertexts.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5003, doi. 10.1002/sec.1671
- By:
- Publication type:
- Article
Hierarchical attribute-based encryption with continuous auxiliary inputs leakage.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 4852, doi. 10.1002/sec.1659
- By:
- Publication type:
- Article
Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 10, p. 1016, doi. 10.1002/sec.1396
- By:
- Publication type:
- Article
Leakage-resilient certificate-based encryption.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3346, doi. 10.1002/sec.1258
- By:
- Publication type:
- Article
Certificateless online/offline signcryption scheme.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 11, p. 1979, doi. 10.1002/sec.1146
- By:
- Publication type:
- Article
Hair Follicle-Targeted Delivery of Azelaic Acid Micro/Nanocrystals Promote the Treatment of Acne Vulgaris.
- Published in:
- International Journal of Nanomedicine, 2024, v. 19, p. 5173, doi. 10.2147/IJN.S459788
- By:
- Publication type:
- Article
Efficient certificate-based signcryption secure against public key replacement attacks and insider attacks.
- Published in:
- 2014
- By:
- Publication type:
- journal article
Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks.
- Published in:
- Scientific World Journal, 2014, p. 1, doi. 10.1155/2014/295419
- By:
- Publication type:
- Article