The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Escrow with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1985-1995 (21) 1996-1997 (58) 1998-1999 (15) 2000-2001 (20) 2002-2003 (16) 2004 (19) 2005 (23) 2006 (19) 2007 (23) 2008 (15) 2009 (21) 2010-2011 (18) 2012-2015 (23) 2016-2018 (18) 2019-2021 (21) 2022-2023 (23) 2024 (4)
Publication types (Num. hits)
article(106) book(1) incollection(30) inproceedings(220)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 218 occurrences of 133 keywords

Results
Found 357 publication records. Showing 357 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
143Adam L. Young, Moti Yung Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Auto-Recoverable Auto-Certifiable Cryptosystems, NIZK, software key escrow, escrow hierarchy, RSA, Public Key, Key Escrow, ElGamal
129Yvo Desmedt, Mike Burmester, Jennifer Seberry Equitability in Retroactive Data Confiscation versus Proactive Key Escrow. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF data confiscation, key escrow, RIP
122Stanislaw Jarecki, Vitaly Shmatikov Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
109E. Thomas Schubert, Sarah Mocas A Mechanized Logic for Secure Key Escrow Protocol Verification. Search on Bibsonomy TPHOLs The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
96Liuba Shrira, Hong Tian, Douglas B. Terry Exo-Leasing: Escrow Synchronization for Mobile Clients of Commodity Storage Servers. Search on Bibsonomy Middleware The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
91JoongHyo Oh, KyungKeun Lee, Sang-Jae Moon How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Mediated identity-based encryption, Identity revocation, Mediated key agreement protocol, Key escrow
91Jan Camenisch, Anna Lysyanskaya An Identity Escrow Scheme with Appointed Verifiers. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF formal model for group signatures, group signatures, privacy protection, Identity escrow
84Stanislaw Jarecki, Vitaly Shmatikov Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure. Search on Bibsonomy Financial Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
84Joe Kilian, Erez Petrank Identity Escrow. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
84Yair Frankel, Moti Yung On Characterization of Escrow Encryption Schemes. Search on Bibsonomy ICALP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
78Kapali Viswanathan, Colin Boyd, Ed Dawson Strong Binding for Software Key Escrow. Search on Bibsonomy ICPP Workshops The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Software key escrow, proxy cryptography, traceability, compliance, enforceability
78Mike Burmester, Yvo Desmedt, Jennifer Seberry Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically). Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF auctions with closed bids, time stamps, key escrow
78Patrick E. O'Neil The Escrow Transactional Method. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1986 DBLP  DOI  BibTeX  RDF Escrow
71Yong-Ho Lee, Im-Yeong Lee, Hyung-Woo Lee New Identity Escrow Scheme for Anonymity Authentication. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
71Byung-Rae Lee, Kyung-Ah Chang, Tai-Yun Kim A Secure and Efficient Key Escrow Protocol for Mobile Communications. Search on Bibsonomy International Conference on Computational Science (1) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
71Mark P. Hoyle, Chris J. Mitchell On Solutions to the Key Escrow Problem. Search on Bibsonomy State of the Art in Applied Cryptography The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
71Yair Frankel, Moti Yung Escrow Encryption Systems Visited: Attacks, Analysis and Designs. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
71Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF revocable anonymity, coalition-resistance, provable security, strong RSA assumption, identity escrow, Group signature schemes
65Jin Wang, Xi Bai 0002, Jia Yu 0005, Daxing Li Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem. Search on Bibsonomy TAMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF key-insulated cryptosystem, bilinear pairings, Identity-based cryptography, key escrow, key exposure
65Noburou Taniguchi, Koji Chida, Osamu Shionoiri, Atsushi Kanai DECIDE: a scheme for decentralized identity escrow. Search on Bibsonomy Digital Identity Management The full citation details ... 2005 DBLP  DOI  BibTeX  RDF fair blind signature, online discussion community, school networking, whistleblowing, trust, anonymity, identity, pseudonymity, identity escrow
65Shingo Miyazaki, Ikuko Kuroda, Kouichi Sakurai Toward Fair International Key Escrow. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Key escrow/recovery system, Diffie-Hellman key distribution, Distributed Cryptography, Security policy, Trusted Third Party
65Yung-Cheng Lee, Chi-Sung Laih On the Key Recovery of the Key Escrow System. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Key Escrow System, social needs, criminal behavior, public cryptographic functions, encryption standard, cryptography, public key cryptography, protection, key recovery, user privacy
58Aybek Mukhamedov, Mark Dermot Ryan On Anonymity with Identity Escrow. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
58Jeeyeon Kim, Seungjoo Kim, Hyunjo Kwon, Sungjae Lee, Sangjoon Park, Dongho Won Forward-Secure Commercial Key Escrow Systems. Search on Bibsonomy WETICE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
58Kapali Viswanathan, Colin Boyd, Ed Dawson Publicly Verifiable Key Escrow with Limited Time Span. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
58Joe Kilian, Frank Thomson Leighton Fair Cryptosystems, Revisited: A Rigorous Approach to Key-Escrow (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
58Edlyn Teske An Elliptic Curve Trapdoor System. Search on Bibsonomy J. Cryptol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Weil descent, Elliptic curve cryptography, Key escrow, Isogenies, Trapdoor functions
58Lan Nguyen Accumulators from Bilinear Pairings and Applications. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF membership revocation, privacy, anonymity, group signatures, ring signatures, ID-based, identity escrow, Dynamic accumulators
58Xiaofeng Chen 0001, Fangguo Zhang, Divyan M. Konidala, Kwangjo Kim New ID-Based Threshold Signature Scheme from Bilinear Pairings. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF ID-based threshold signature, Bilinear pairings, Key escrow
53Eric R. Verheul, Henk C. A. van Tilborg Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals. Search on Bibsonomy EUROCRYPT The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Traceable ElGamal, Key Recovery, Key Escrow, ElGamal
51Adam L. Young, Moti Yung Auto-recoverable Auto-certifiable Cryptosystems (A Survey). Search on Bibsonomy CQRE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
45Sherman S. M. Chow Removing Escrow from Identity-Based Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
45Chen Huang 0003, Benxiong Huang, Yijun Mo, Jianhua Ma SRPTES: A Secure Routing Protocol Based on Token Escrow Set for Ad Hoc Networks. Search on Bibsonomy AINA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security, Routing, Ad hoc, Token
45Bill G. Horne, Benny Pinkas, Tomas Sander Escrow services and incentives in peer-to-peer networks. Search on Bibsonomy EC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
45Narayanan Krishnakumar, Ravi Jain Escrow techniques for mobile sales and inventory applications. Search on Bibsonomy Wirel. Networks The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
45Haeryong Park, Hak Soo Ju, Kilsoo Chun, Jaeil Lee, Seungho Ahn, Bongnam Noh The Algorithm to Enhance the Security of Multi-Agent in Distributed Computing Environment. Search on Bibsonomy ICPADS (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ID-based threshold decryption(ID-ThD), Dynamic group management, Wireless network, Key escrow
45Florian Hess Efficient Identity Based Signature Schemes Based on Pairings. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Tate pairing, key escrow, Identity based signatures, Weil pairing
45Jan Camenisch, Anna Lysyanskaya Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF anonymity, group signatures, certificate revocation, credential systems, identity escrow, Dynamic accumulators
45Detlef Hühnlein, Michael J. Jacobson Jr., Sachar Paulus, Tsuyoshi Takagi A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF imaginary quadratic order, trapdoor decryption, factorization, Public key cryptosystem, key escrow
45Adam L. Young, Moti Yung The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone? Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Cryptanalytic attacks, Private key, applied systems, design and manufacturing of cryptographic devices and software, auto-escrowing keys, software, RSA, randomness, hardware, Public Key, pseudorandomness, Kerberos, key escrow, DSA, ElGamal, subliminal channels, Capstone
40JongHo Ryu, JungChan Na Information-Revealing with Distributed Escrow Authorities. Search on Bibsonomy NCM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Information-Revealing, Distributed Escrow
40Mengbo Hou, Qiuliang Xu, Tao Ban Perfect Forward Secure Two-Party Key Agreement Protocol with Key Escrow. Search on Bibsonomy IIH-MSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF key control, identity-based encryption, key escrow, authenticated key agreement, perfect forward secrecy
38Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee 0001, Jongin Lim 0001, Kilsoo Chun Efficient Revocation of Security Capability in Certificateless Public Key Cryptography. Search on Bibsonomy KES (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
38Eiichiro Fujisaki, Tatsuaki Okamoto A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
38Adam L. Young, Moti Yung Auto-Recoverable Auto-Certifiable Cryptosystems. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
33Shengbao Wang, Zhenfu Cao, ZhaoHui Cheng, Kim-Kwang Raymond Choo Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF modular security proof, provable security, bilinear pairing, authenticated key agreement, perfect forward secrecy
33Aybek Mukhamedov, Mark Dermot Ryan Anonymity Protocol with Identity Escrow and Analysis in the Applied n-Calculus. Search on Bibsonomy TGC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33Keiichi Hirota, Noboru Sonehara Simple and Secure Authentication Escrow for Rights Trading Protocol. Search on Bibsonomy SAINT Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33Sattam S. Al-Riyami, John Malone-Lee, Nigel P. Smart Escrow-free encryption supporting cryptographic workflow. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Workflow, Pairings, Identity based encryption
33Volker Siegel Software-Escrow. Search on Bibsonomy Inform. Spektrum The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Martin Schaffer, Peter Schartner Key Escrow with Tree-Based Access Structure. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33George Danezis An Anonymous Auction Protocol Using "Money Escrow" (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
33Lars R. Knudsen, Torben P. Pedersen On the Difficulty of Software Key Escrow. Search on Bibsonomy EUROCRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
33Yvo Desmedt Securing Traceability of Ciphertexts - Towards a Secure Software Key Escrow System (Extended Abstract). Search on Bibsonomy EUROCRYPT The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
33Silvio Micali, Ray Sidney A Simple Method for Generating and Sharing Pseudo-Random Functions, with Applications to Clipper-like Escrow Systems. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
33Arjen K. Lenstra, Peter Winkler 0001, Yacov Yacobi A Key Escrow System with Warrant Bounds. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
33Thomas Beth, Hans-Joachim Knobloch, Marcus Otten, Gustavus J. Simmons, Peer Wichmann Towards Acceptable Key Escrow Systems. Search on Bibsonomy CCS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
33Marc Joye RSA Moduli with a Predetermined Portion: Techniques and Applications. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RSA-type cryptosystems, RSA moduli, RSA key lengths, diminished-radix moduli, key transport, key storage, key transmission, tamper-resistant devices, smart cards, key escrow, key generation, kleptography, setup, key compression
33Youngho Park 0004, Jung-Hwa Shin, Kyung Hyune Rhee Design of a Secure Digital Contents Delivery System in P2P Networks. Search on Bibsonomy DRMTICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Escrow Service, Key Issuing, P2P, Contents Distribution
33Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF key issuing, bilinear pairings, key escrow, secure channel, ID-based cryptosystems
33Juan Manuel González Nieto, Kapali Viswanathan, Colin Boyd, Andrew J. Clark, Ed Dawson Key recovery for the commercial environment. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Commercial key recovery, Software key recovery, Key management, Key escrow
33Yvo Desmedt, Yongge Wang Efficient Zero-Knowledge Proofs for Some Practical Graph Problems. Search on Bibsonomy SCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF complexity, graph theory, secret sharing, Zero-knowledge, key-escrow
33Daisuke Hirakiuchi, Kouichi Sakurai English vs. Sealed Bid in Anonymous Electronic Auction Protocols. Search on Bibsonomy WETICE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF English auction, anonymity, group signatures, sealed bid auction, electronic auction, identity escrow
33Birgit Pfitzmann, Ahmad-Reza Sadeghi Self-Escrowed Cash against User Blackmailing. Search on Bibsonomy Financial Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Escrowed Cash, Fair Cash, Digital Coin, Blackmailing, Self-Escrow, Anonymity Revocation
33Barbara C. Davis, Tatu Ylönen Working Group Report on Internet/Intranet Security. Search on Bibsonomy WETICE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF intranet security, key backup, security implementation costs, security functionality, fault tolerance, Internet, enterprises, secure communications, Internet security, data protection, information infrastructure, key recovery, key escrow, law enforcement, redundant paths, data value
25Yang Lu 0001, Jiguo Li 0001 Forward-Secure Certificate-Based Encryption. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Bo Zhang 0020, Qiuliang Xu Certificateless Proxy Blind Signature Scheme from Bilinear Pairings. Search on Bibsonomy WKDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Shanqing Guo, Chunhua Zhang Identity-based Broadcast Encryption Scheme with Untrusted PKG. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Saeran Kwon, Sang-Ho Lee Identity-Based Key Issuing Without Secure Channel in a Broad Area. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Feng Cao, Zhenfu Cao, Licheng Wang An Improvement of an Identity-Based Key Issuing Protocol. Search on Bibsonomy IMSCCS (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Saeran Kwon, Sang-Ho Lee Security Analysis and Improvement for Key Issuing Schemes in ID-Based Cryptography. Search on Bibsonomy TrustBus The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Jian Liao, Junfang Xiao, Yinghao Qi, Peiwei Huang, Mentian Rong ID-Based Signature Scheme Without Trusted PKG. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25M. Choudary Gorantla, Ashutosh Saxena An Efficient Certificateless Signature Scheme. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Dae Hyun Yum, Pil Joong Lee Identity-Based Cryptography in Public Key Management. Search on Bibsonomy EuroPKI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Dae Hyun Yum, Pil Joong Lee Generic Construction of Certificateless Signature. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF public-key signature, identity-based signature, Certificateless signature
25N. Boris Margolin, Matthew K. Wright, Brian Neil Levine Analysis of an incentives-based secrets protection system. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF economics, digital rights management, incentives
25Dae Hyun Yum, Pil Joong Lee Generic Construction of Certificateless Encryption. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Stanislaw Jarecki, Patrick Lincoln, Vitaly Shmatikov Negotiated Privacy: (Extended Abstract). Search on Bibsonomy ISSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
25Birgit Pfitzmann, Michael Waidner How to Break Fraud-Detectable Key Recovery. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
25Ross J. Anderson, Michael Roe The GCHQ Protocol and Its Problems. Search on Bibsonomy EUROCRYPT The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
25Yahya Y. Al-Salqan Cryptographic Key Recovery. Search on Bibsonomy FTDCS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
20Xu He, Lixiang Li 0001, Haipeng Peng A Key Escrow-Free KP-ABE Scheme and Its Application in Standalone Authentication in IoT. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Tongda Liu, Zekun Li, Yanyan Ji, Jinyong Chang Efficient Key-Escrow-Free and Vehicle-Revocable Data Sharing Protocol for Vehicular Ad Hoc Network. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Meijuan Huang, Yutian Liu, Bo Yang 0003, Yanqi Zhao, Mingrui Zhang Efficient Revocable Attribute-Based Encryption with Data Integrity and Key Escrow-Free. Search on Bibsonomy Inf. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20 Retraction Note: Enhanced post-quantum key escrow system for supervised data conflict of interest based on consortium blockchain. Search on Bibsonomy J. Comb. Optim. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Caihui Lan, Liangliang Liu, Caifen Wang, Haifeng Li 0009 An efficient and revocable attribute-based data sharing scheme with rich expression and escrow freedom. Search on Bibsonomy Inf. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Yuyan Guo, Zhenhua Lu, Hui Ge, Jiguo Li 0001 Revocable Blockchain-Aided Attribute-Based Encryption With Escrow-Free in Cloud Storage. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Axin Xiang, Hongfeng Gao, Youliang Tian, Liang Wan DBKEM-AACS: a distributed key escrow model in blockchain with anonymous authentication and committee selection. Search on Bibsonomy Sci. China Inf. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Zhiru Zhu, Raul Castro Fernandez Making Differential Privacy Easier to Use for Data Controllers and Data Analysts using a Privacy Risk Indicator and an Escrow-Based Platform. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Siyuan Xia, Zhiru Zhu, Chris Zhu, Jinjin Zhao, Kyle Chard, Aaron J. Elmore, Ian T. Foster, Michael J. Franklin, Sanjay Krishnan, Raul Castro Fernandez Data Station: Delegated, Trustworthy, and Auditable Computation to Enable Data-Sharing Consortia with a Data Escrow. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Mahender Kumar An Approach to Remove Key Escrow Problem in ID-Based Encryption From Pairing. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Christian Weitzel Remmertz/Kast (Hrsg.): Digital Escrow. Search on Bibsonomy Comput. und Recht The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Guido Aßhoff Software Escrow Vertragsgestaltung zwischen Compliance-Anforderungen und Datenschutz. Search on Bibsonomy Comput. und Recht The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal Shield: Secure Allegation Escrow System with Stronger Guarantees. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
20Girraj Kumar Verma, Prosanta Gope, Neetesh Saxena, Neeraj Kumar 0001 CB-DA: Lightweight and Escrow-Free Certificate-Based Data Aggregation for Smart Grid. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20 Enhanced post-quantum key escrow system for supervised data conflict of interest based on consortium blockchain. Search on Bibsonomy J. Comb. Optim. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal Shield: Secure Allegation Escrow System with Stronger Guarantees. Search on Bibsonomy WWW The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Easwar Vivek Mangipudi, Donghang Lu, Alexandros Psomas 0001, Aniket Kate Collusion-Deterrent Threshold Information Escrow. Search on Bibsonomy CSF The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Sourabh Bhaskar, Keyur Parmar, Devesh C. Jinwala Escrow and Pairing Free CP-ABE Scheme with Forward and Backward Secrecy for Healthcare Internet of Things. Search on Bibsonomy ICISS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Ryosuke Abe, Seiyo Kurita, Mariko Kobayashi, Shigeya Suzuki Mitigation of Seller and Buyer's Dilemma with Transaction History and Escrow. Search on Bibsonomy AINTEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 357 (100 per page; Change: )
Pages: [1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license