Works matching IS 01290541 AND DT 2017 AND VI 28 AND IP 6
Results: 10
Preface.
- Published in:
- International Journal of Foundations of Computer Science, 2017, v. 28, n. 6, p. 641, doi. 10.1142/S0129054117020026
- By:
- Publication type:
- Article
Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data.
- Published in:
- International Journal of Foundations of Computer Science, 2017, v. 28, n. 6, p. 661, doi. 10.1142/S0129054117400123
- By:
- Publication type:
- Article
Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud Environment.
- Published in:
- International Journal of Foundations of Computer Science, 2017, v. 28, n. 6, p. 645, doi. 10.1142/S0129054117400111
- By:
- Publication type:
- Article
Confidentiality-Preserving Publicly Verifiable Computation.
- Published in:
- International Journal of Foundations of Computer Science, 2017, v. 28, n. 6, p. 799, doi. 10.1142/S0129054117400196
- By:
- Publication type:
- Article
Securing Information Exchange in VANETs by Using Pairing-Based Cryptography.
- Published in:
- International Journal of Foundations of Computer Science, 2017, v. 28, n. 6, p. 781, doi. 10.1142/S0129054117400184
- By:
- Publication type:
- Article
A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting.
- Published in:
- International Journal of Foundations of Computer Science, 2017, v. 28, n. 6, p. 761, doi. 10.1142/S0129054117400172
- By:
- Publication type:
- Article
Identity-Based Batch Provable Data Possession with Detailed Analyses.
- Published in:
- International Journal of Foundations of Computer Science, 2017, v. 28, n. 6, p. 743, doi. 10.1142/S0129054117400160
- By:
- Publication type:
- Article
One-Round Attribute-Based Key Exchange in the Multi-Party Setting.
- Published in:
- International Journal of Foundations of Computer Science, 2017, v. 28, n. 6, p. 725, doi. 10.1142/S0129054117400159
- By:
- Publication type:
- Article
Accountable CP-ABE with Public Verifiability: How to Effectively Protect the Outsourced Data in Cloud.
- Published in:
- International Journal of Foundations of Computer Science, 2017, v. 28, n. 6, p. 705, doi. 10.1142/S0129054117400147
- By:
- Publication type:
- Article
Practical Secure Naïve Bayesian Classification Over Encrypted Big Data in Cloud.
- Published in:
- International Journal of Foundations of Computer Science, 2017, v. 28, n. 6, p. 683, doi. 10.1142/S0129054117400135
- By:
- Publication type:
- Article