|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 218 occurrences of 133 keywords
|
|
|
Results
Found 357 publication records. Showing 357 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
143 | Adam L. Young, Moti Yung |
Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings, pp. 306-314, 1999, Springer, 3-540-65644-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Auto-Recoverable Auto-Certifiable Cryptosystems, NIZK, software key escrow, escrow hierarchy, RSA, Public Key, Key Escrow, ElGamal |
129 | Yvo Desmedt, Mike Burmester, Jennifer Seberry |
Equitability in Retroactive Data Confiscation versus Proactive Key Escrow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings, pp. 277-286, 2001, Springer, 3-540-41658-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
data confiscation, key escrow, RIP |
122 | Stanislaw Jarecki, Vitaly Shmatikov |
Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, pp. 590-608, 2004, Springer, 3-540-21935-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
109 | E. Thomas Schubert, Sarah Mocas |
A Mechanized Logic for Secure Key Escrow Protocol Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TPHOLs ![In: Higher Order Logic Theorem Proving and Its Applications, 8th International Workshop, Aspen Grove, UT, USA, September 11-14, 1995, Proceedings, pp. 308-323, 1995, Springer, 3-540-60275-5. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
96 | Liuba Shrira, Hong Tian, Douglas B. Terry |
Exo-Leasing: Escrow Synchronization for Mobile Clients of Commodity Storage Servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Middleware ![In: Middleware 2008, ACM/IFIP/USENIX 9th International Middleware Conference, Leuven, Belgium, December 1-5, 2008, Proceedings, pp. 42-61, 2008, Springer, 978-3-540-89855-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
91 | JoongHyo Oh, KyungKeun Lee, Sang-Jae Moon |
How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 290-303, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Mediated identity-based encryption, Identity revocation, Mediated key agreement protocol, Key escrow |
91 | Jan Camenisch, Anna Lysyanskaya |
An Identity Escrow Scheme with Appointed Verifiers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings, pp. 388-407, 2001, Springer, 3-540-42456-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
formal model for group signatures, group signatures, privacy protection, Identity escrow |
84 | Stanislaw Jarecki, Vitaly Shmatikov |
Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers, pp. 172-187, 2005, Springer, 3-540-26656-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
84 | Joe Kilian, Erez Petrank |
Identity Escrow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings, pp. 169-185, 1998, Springer, 3-540-64892-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
84 | Yair Frankel, Moti Yung |
On Characterization of Escrow Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP ![In: Automata, Languages and Programming, 24th International Colloquium, ICALP'97, Bologna, Italy, 7-11 July 1997, Proceedings, pp. 705-715, 1997, Springer, 3-540-63165-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
78 | Kapali Viswanathan, Colin Boyd, Ed Dawson |
Strong Binding for Software Key Escrow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP Workshops ![In: Proceedings of the 1999 International Conference on Parallel Processing Workshops, ICPPW 1999, Wakamatsu, Japan, September 21-24, 1999, pp. 134-139, 1999, IEEE Computer Society, 0-7695-0353-5. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Software key escrow, proxy cryptography, traceability, compliance, enforceability |
78 | Mike Burmester, Yvo Desmedt, Jennifer Seberry |
Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings, pp. 380-391, 1998, Springer, 3-540-65109-8. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
auctions with closed bids, time stamps, key escrow |
78 | Patrick E. O'Neil |
The Escrow Transactional Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 11(4), pp. 405-430, 1986. The full citation details ...](Pics/full.jpeg) |
1986 |
DBLP DOI BibTeX RDF |
Escrow |
71 | Yong-Ho Lee, Im-Yeong Lee, Hyung-Woo Lee |
New Identity Escrow Scheme for Anonymity Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002, pp. 382-394, 2002, Springer, 3-540-00263-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
71 | Byung-Rae Lee, Kyung-Ah Chang, Tai-Yun Kim |
A Secure and Efficient Key Escrow Protocol for Mobile Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (1) ![In: Computational Science - ICCS 2001, International Conference, San Francisco, CA, USA, May 28-30, 2001. Proceedings, Part I, pp. 433-446, 2001, Springer, 3-540-42232-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
71 | Mark P. Hoyle, Chris J. Mitchell |
On Solutions to the Key Escrow Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
State of the Art in Applied Cryptography ![In: State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures, pp. 277-306, 1997, Springer, 3-540-65474-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
71 | Yair Frankel, Moti Yung |
Escrow Encryption Systems Visited: Attacks, Analysis and Designs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings, pp. 222-235, 1995, Springer, 3-540-60221-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
71 | Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik |
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings, pp. 255-270, 2000, Springer, 3-540-67907-3. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
revocable anonymity, coalition-resistance, provable security, strong RSA assumption, identity escrow, Group signature schemes |
65 | Jin Wang, Xi Bai 0002, Jia Yu 0005, Daxing Li |
Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TAMC ![In: Theory and Applications of Models of Computation, 4th International Conference, TAMC 2007, Shanghai, China, May 22-25, 2007, Proceedings, pp. 148-158, 2007, Springer, 978-3-540-72503-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
key-insulated cryptosystem, bilinear pairings, Identity-based cryptography, key escrow, key exposure |
65 | Noburou Taniguchi, Koji Chida, Osamu Shionoiri, Atsushi Kanai |
DECIDE: a scheme for decentralized identity escrow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, November 11, 2005, pp. 37-45, 2005, ACM, 1-59593-232-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
fair blind signature, online discussion community, school networking, whistleblowing, trust, anonymity, identity, pseudonymity, identity escrow |
65 | Shingo Miyazaki, Ikuko Kuroda, Kouichi Sakurai |
Toward Fair International Key Escrow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings, pp. 171-187, 1999, Springer, 3-540-65644-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Key escrow/recovery system, Diffie-Hellman key distribution, Distributed Cryptography, Security policy, Trusted Third Party |
65 | Yung-Cheng Lee, Chi-Sung Laih |
On the Key Recovery of the Key Escrow System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 216-220, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Key Escrow System, social needs, criminal behavior, public cryptographic functions, encryption standard, cryptography, public key cryptography, protection, key recovery, user privacy |
58 | Aybek Mukhamedov, Mark Dermot Ryan |
On Anonymity with Identity Escrow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust, Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers, pp. 235-243, 2005, Springer, 3-540-32628-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
58 | Jeeyeon Kim, Seungjoo Kim, Hyunjo Kwon, Sungjae Lee, Sangjoon Park, Dongho Won |
Forward-Secure Commercial Key Escrow Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 20-22 June 2001, Cambridge, MA, USA, pp. 211-216, 2001, IEEE Computer Society, 0-7695-1269-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
58 | Kapali Viswanathan, Colin Boyd, Ed Dawson |
Publicly Verifiable Key Escrow with Limited Time Span. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings, pp. 36-50, 1999, Springer, 3-540-65756-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
58 | Joe Kilian, Frank Thomson Leighton |
Fair Cryptosystems, Revisited: A Rigorous Approach to Key-Escrow (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings, pp. 208-221, 1995, Springer, 3-540-60221-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
58 | Edlyn Teske |
An Elliptic Curve Trapdoor System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 19(1), pp. 115-133, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Weil descent, Elliptic curve cryptography, Key escrow, Isogenies, Trapdoor functions |
58 | Lan Nguyen |
Accumulators from Bilinear Pairings and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings, pp. 275-292, 2005, Springer, 3-540-24399-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
membership revocation, privacy, anonymity, group signatures, ring signatures, ID-based, identity escrow, Dynamic accumulators |
58 | Xiaofeng Chen 0001, Fangguo Zhang, Divyan M. Konidala, Kwangjo Kim |
New ID-Based Threshold Signature Scheme from Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings, pp. 371-383, 2004, Springer, 3-540-24130-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
ID-based threshold signature, Bilinear pairings, Key escrow |
53 | Eric R. Verheul, Henk C. A. van Tilborg |
Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding, pp. 119-133, 1997, Springer, 3-540-62975-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Traceable ElGamal, Key Recovery, Key Escrow, ElGamal |
51 | Adam L. Young, Moti Yung |
Auto-recoverable Auto-certifiable Cryptosystems (A Survey). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CQRE ![In: Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30 - December 2, 1999, Proceedings, pp. 204-218, 1999, Springer, 3-540-66800-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
45 | Sherman S. M. Chow |
Removing Escrow from Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings, pp. 256-276, 2009, Springer, 978-3-642-00467-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
45 | Chen Huang 0003, Benxiong Huang, Yijun Mo, Jianhua Ma |
SRPTES: A Secure Routing Protocol Based on Token Escrow Set for Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 22nd International Conference on Advanced Information Networking and Applications, AINA 2008, GinoWan, Okinawa, Japan, March 25-28, 2008, pp. 583-589, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Security, Routing, Ad hoc, Token |
45 | Bill G. Horne, Benny Pinkas, Tomas Sander |
Escrow services and incentives in peer-to-peer networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC ![In: Proceedings 3rd ACM Conference on Electronic Commerce (EC-2001), Tampa, Florida, USA, October 14-17, 2001, pp. 85-94, 2001, ACM, 1-58113-387-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
45 | Narayanan Krishnakumar, Ravi Jain |
Escrow techniques for mobile sales and inventory applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Networks ![In: Wirel. Networks 3(3), pp. 235-246, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
45 | Haeryong Park, Hak Soo Ju, Kilsoo Chun, Jaeil Lee, Seungho Ahn, Bongnam Noh |
The Algorithm to Enhance the Security of Multi-Agent in Distributed Computing Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS (2) ![In: 12th International Conference on Parallel and Distributed Systems, ICPADS 2006, Minneapolis, Minnesota, USA, July 12-15, 2006, pp. 55-60, 2006, IEEE Computer Society, 0-7695-2612-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
ID-based threshold decryption(ID-ThD), Dynamic group management, Wireless network, Key escrow |
45 | Florian Hess |
Efficient Identity Based Signature Schemes Based on Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers, pp. 310-324, 2002, Springer, 3-540-00622-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Tate pairing, key escrow, Identity based signatures, Weil pairing |
45 | Jan Camenisch, Anna Lysyanskaya |
Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings, pp. 61-76, 2002, Springer, 3-540-44050-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
anonymity, group signatures, certificate revocation, credential systems, identity escrow, Dynamic accumulators |
45 | Detlef Hühnlein, Michael J. Jacobson Jr., Sachar Paulus, Tsuyoshi Takagi |
A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding, pp. 294-307, 1998, Springer, 3-540-64518-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
imaginary quadratic order, trapdoor decryption, factorization, Public key cryptosystem, key escrow |
45 | Adam L. Young, Moti Yung |
The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings, pp. 89-103, 1996, Springer, 3-540-61512-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Cryptanalytic attacks, Private key, applied systems, design and manufacturing of cryptographic devices and software, auto-escrowing keys, software, RSA, randomness, hardware, Public Key, pseudorandomness, Kerberos, key escrow, DSA, ElGamal, subliminal channels, Capstone |
40 | JongHo Ryu, JungChan Na |
Information-Revealing with Distributed Escrow Authorities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCM ![In: International Conference on Networked Computing and Advanced Information Management, NCM 2009, Fifth International Joint Conference on INC, IMS and IDC: INC 2009: International Conference on Networked Computing, IMS 2009: International Conference on Advanced Information Management and Service, IDC 2009: International Conference on Digital Content, Multimedia Technology and its Applications, Seoul, Korea, August 25-27, 2009, pp. 1141-1146, 2009, IEEE Computer Society, 978-0-7695-3769-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Information-Revealing, Distributed Escrow |
40 | Mengbo Hou, Qiuliang Xu, Tao Ban |
Perfect Forward Secure Two-Party Key Agreement Protocol with Key Escrow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), Kyoto, Japan, 12-14 September, 2009, Proceedings, pp. 644-647, 2009, IEEE Computer Society, 978-1-4244-4717-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
key control, identity-based encryption, key escrow, authenticated key agreement, perfect forward secrecy |
38 | Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee 0001, Jongin Lim 0001, Kilsoo Chun |
Efficient Revocation of Security Capability in Certificateless Public Key Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (2) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part II, pp. 453-459, 2005, Springer, 3-540-28895-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
38 | Eiichiro Fujisaki, Tatsuaki Okamoto |
A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding, pp. 32-46, 1998, Springer, 3-540-64518-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
38 | Adam L. Young, Moti Yung |
Auto-Recoverable Auto-Certifiable Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding, pp. 17-31, 1998, Springer, 3-540-64518-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
33 | Shengbao Wang, Zhenfu Cao, ZhaoHui Cheng, Kim-Kwang Raymond Choo |
Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 52(8), pp. 1358-1370, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
modular security proof, provable security, bilinear pairing, authenticated key agreement, perfect forward secrecy |
33 | Aybek Mukhamedov, Mark Dermot Ryan |
Anonymity Protocol with Identity Escrow and Analysis in the Applied n-Calculus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TGC ![In: Trustworthy Global Computing, Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers, pp. 330-346, 2007, Springer, 978-3-540-78662-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Keiichi Hirota, Noboru Sonehara |
Simple and Secure Authentication Escrow for Rights Trading Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT Workshops ![In: 2007 International Symposium on Applications and the Internet - Workshops (SAINT 2007 Workshops), 15-19 January 2007, Hiroshima, Japan, pp. 29, 2007, IEEE Computer Society, 0-7695-2757-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Sattam S. Al-Riyami, John Malone-Lee, Nigel P. Smart |
Escrow-free encryption supporting cryptographic workflow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 5(4), pp. 217-229, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Workflow, Pairings, Identity based encryption |
33 | Volker Siegel |
Software-Escrow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inform. Spektrum ![In: Inform. Spektrum 28(5), pp. 403-406, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Martin Schaffer, Peter Schartner |
Key Escrow with Tree-Based Access Structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings, pp. 454-459, 2005, Springer, 3-540-29113-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | George Danezis |
An Anonymous Auction Protocol Using "Money Escrow" (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers, pp. 223-233, 2000, Springer, 3-540-42566-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
33 | Lars R. Knudsen, Torben P. Pedersen |
On the Difficulty of Software Key Escrow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceeding, pp. 237-244, 1996, Springer, 3-540-61186-X. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
33 | Yvo Desmedt |
Securing Traceability of Ciphertexts - Towards a Secure Software Key Escrow System (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '95, International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995, Proceeding, pp. 147-157, 1995, Springer, 3-540-59409-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
33 | Silvio Micali, Ray Sidney |
A Simple Method for Generating and Sharing Pseudo-Random Functions, with Applications to Clipper-like Escrow Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings, pp. 185-196, 1995, Springer, 3-540-60221-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
33 | Arjen K. Lenstra, Peter Winkler 0001, Yacov Yacobi |
A Key Escrow System with Warrant Bounds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings, pp. 197-207, 1995, Springer, 3-540-60221-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
33 | Thomas Beth, Hans-Joachim Knobloch, Marcus Otten, Gustavus J. Simmons, Peer Wichmann |
Towards Acceptable Key Escrow Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '94, Proceedings of the 2nd ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 2-4, 1994., pp. 51-58, 1994, ACM, 0-89791-732-4. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
33 | Marc Joye |
RSA Moduli with a Predetermined Portion: Techniques and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 116-130, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
RSA-type cryptosystems, RSA moduli, RSA key lengths, diminished-radix moduli, key transport, key storage, key transmission, tamper-resistant devices, smart cards, key escrow, key generation, kleptography, setup, key compression |
33 | Youngho Park 0004, Jung-Hwa Shin, Kyung Hyune Rhee |
Design of a Secure Digital Contents Delivery System in P2P Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DRMTICS ![In: Digital Rights Management: Technologies, Issues, Challenges and Systems, First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected Papers, pp. 311-321, 2005, Springer, 3-540-35998-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Escrow Service, Key Issuing, P2P, Contents Distribution |
33 | Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati |
An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 674-678, 2005, IEEE Computer Society, 0-7695-2315-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
key issuing, bilinear pairings, key escrow, secure channel, ID-based cryptosystems |
33 | Juan Manuel González Nieto, Kapali Viswanathan, Colin Boyd, Andrew J. Clark, Ed Dawson |
Key recovery for the commercial environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 1(3), pp. 161-174, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Commercial key recovery, Software key recovery, Key management, Key escrow |
33 | Yvo Desmedt, Yongge Wang |
Efficient Zero-Knowledge Proofs for Some Practical Graph Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 290-302, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
complexity, graph theory, secret sharing, Zero-knowledge, key-escrow |
33 | Daisuke Hirakiuchi, Kouichi Sakurai |
English vs. Sealed Bid in Anonymous Electronic Auction Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 20-22 June 2001, Cambridge, MA, USA, pp. 171-176, 2001, IEEE Computer Society, 0-7695-1269-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
English auction, anonymity, group signatures, sealed bid auction, electronic auction, identity escrow |
33 | Birgit Pfitzmann, Ahmad-Reza Sadeghi |
Self-Escrowed Cash against User Blackmailing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 4th International Conference, FC 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings, pp. 42-52, 2000, Springer, 3-540-42700-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Escrowed Cash, Fair Cash, Digital Coin, Blackmailing, Self-Escrow, Anonymity Revocation |
33 | Barbara C. Davis, Tatu Ylönen |
Working Group Report on Internet/Intranet Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 6th Workshop on Enabling Technologies (WET-ICE '97), Infrastructure for Collaborative Enterprises, 18-20 June 1997, MIT, Cambridge, MA, USA, Proceedings, pp. 305-308, 1997, IEEE Computer Society, 0-8186-7967-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
intranet security, key backup, security implementation costs, security functionality, fault tolerance, Internet, enterprises, secure communications, Internet security, data protection, information infrastructure, key recovery, key escrow, law enforcement, redundant paths, data value |
25 | Yang Lu 0001, Jiguo Li 0001 |
Forward-Secure Certificate-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 57-60, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Bo Zhang 0020, Qiuliang Xu |
Certificateless Proxy Blind Signature Scheme from Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, WKDD 2009, Moscow, Russia, 23-25 January 2009, pp. 573-576, 2009, IEEE Computer Society, 978-0-7695-3543-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Shanqing Guo, Chunhua Zhang |
Identity-based Broadcast Encryption Scheme with Untrusted PKG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 1613-1618, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Saeran Kwon, Sang-Ho Lee |
Identity-Based Key Issuing Without Secure Channel in a Broad Area. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers, pp. 30-44, 2006, Springer, 978-3-540-71092-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Feng Cao, Zhenfu Cao, Licheng Wang |
An Improvement of an Identity-Based Key Issuing Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMSCCS (2) ![In: Interdisciplinary and Multidisciplinary Research in Computer Science, IEEE CS Proceeding of the First International Multi-Symposium of Computer and Computational Sciences (IMSCCS|06), June 20-24, 2006, Zhejiang University, Hangzhou, China, Vol. 2, pp. 13-18, 2006, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Saeran Kwon, Sang-Ho Lee |
Security Analysis and Improvement for Key Issuing Schemes in ID-Based Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust and Privacy in Digital Business, Third International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings, pp. 203-212, 2006, Springer, 3-540-37750-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Jian Liao, Junfang Xiao, Yinghao Qi, Peiwei Huang, Mentian Rong |
ID-Based Signature Scheme Without Trusted PKG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 53-62, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | M. Choudary Gorantla, Ashutosh Saxena |
An Efficient Certificateless Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 110-116, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Dae Hyun Yum, Pil Joong Lee |
Identity-Based Cryptography in Public Key Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings, pp. 71-84, 2004, Springer, 3-540-22216-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Dae Hyun Yum, Pil Joong Lee |
Generic Construction of Certificateless Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, pp. 200-211, 2004, Springer, 3-540-22379-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
public-key signature, identity-based signature, Certificateless signature |
25 | N. Boris Margolin, Matthew K. Wright, Brian Neil Levine |
Analysis of an incentives-based secrets protection system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, DC, USA, October 25, 2004, pp. 22-30, 2004, ACM, 1-58113-969-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
economics, digital rights management, incentives |
25 | Dae Hyun Yum, Pil Joong Lee |
Generic Construction of Certificateless Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 802-811, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Stanislaw Jarecki, Patrick Lincoln, Vitaly Shmatikov |
Negotiated Privacy: (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSS ![In: Software Security -- Theories and Systems, Mext-NSF-JSPS International Symposium, ISSS 2002, Tokyo, Japan, November 8-10, 2002, Revised Papers, pp. 96-111, 2002, Springer, 3-540-00708-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Birgit Pfitzmann, Michael Waidner |
How to Break Fraud-Detectable Key Recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 32(1), pp. 23-28, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
25 | Ross J. Anderson, Michael Roe |
The GCHQ Protocol and Its Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding, pp. 134-148, 1997, Springer, 3-540-62975-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
25 | Yahya Y. Al-Salqan |
Cryptographic Key Recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FTDCS ![In: 6th IEEE Workshop on Future Trends of Distributed Computer Systems (FTDCS '97), 29-31 October 1997, Tunis, Tunisia, Proceedings, pp. 34-39, 1997, IEEE Computer Society, 0-8186-8153-5. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
20 | Xu He, Lixiang Li 0001, Haipeng Peng |
A Key Escrow-Free KP-ABE Scheme and Its Application in Standalone Authentication in IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 11(7), pp. 11381-11394, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Tongda Liu, Zekun Li, Yanyan Ji, Jinyong Chang |
Efficient Key-Escrow-Free and Vehicle-Revocable Data Sharing Protocol for Vehicular Ad Hoc Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 11(7), pp. 11540-11553, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Meijuan Huang, Yutian Liu, Bo Yang 0003, Yanqi Zhao, Mingrui Zhang |
Efficient Revocable Attribute-Based Encryption with Data Integrity and Key Escrow-Free. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. ![In: Inf. 15(1), pp. 32, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
20 | |
Retraction Note: Enhanced post-quantum key escrow system for supervised data conflict of interest based on consortium blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comb. Optim. ![In: J. Comb. Optim. 47(3), pp. 36, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Caihui Lan, Liangliang Liu, Caifen Wang, Haifeng Li 0009 |
An efficient and revocable attribute-based data sharing scheme with rich expression and escrow freedom. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 624, pp. 435-450, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Yuyan Guo, Zhenhua Lu, Hui Ge, Jiguo Li 0001 |
Revocable Blockchain-Aided Attribute-Based Encryption With Escrow-Free in Cloud Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 72(7), pp. 1901-1912, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Axin Xiang, Hongfeng Gao, Youliang Tian, Liang Wan |
DBKEM-AACS: a distributed key escrow model in blockchain with anonymous authentication and committee selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Inf. Sci. ![In: Sci. China Inf. Sci. 66(3), March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Zhiru Zhu, Raul Castro Fernandez |
Making Differential Privacy Easier to Use for Data Controllers and Data Analysts using a Privacy Risk Indicator and an Escrow-Based Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.13104, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Siyuan Xia, Zhiru Zhu, Chris Zhu, Jinjin Zhao, Kyle Chard, Aaron J. Elmore, Ian T. Foster, Michael J. Franklin, Sanjay Krishnan, Raul Castro Fernandez |
Data Station: Delegated, Trustworthy, and Auditable Computation to Enable Data-Sharing Consortia with a Data Escrow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2305.03842, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Mahender Kumar |
An Approach to Remove Key Escrow Problem in ID-Based Encryption From Pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2307.02411, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Christian Weitzel |
Remmertz/Kast (Hrsg.): Digital Escrow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. und Recht ![In: Comput. und Recht 39(7), pp. 79, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Guido Aßhoff |
Software Escrow Vertragsgestaltung zwischen Compliance-Anforderungen und Datenschutz. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. und Recht ![In: Comput. und Recht 39(4), pp. 269-276, April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal |
Shield: Secure Allegation Escrow System with Stronger Guarantees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 338, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
20 | Girraj Kumar Verma, Prosanta Gope, Neetesh Saxena, Neeraj Kumar 0001 |
CB-DA: Lightweight and Escrow-Free Certificate-Based Data Aggregation for Smart Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 20(3), pp. 2011-2024, May - June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | |
Enhanced post-quantum key escrow system for supervised data conflict of interest based on consortium blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comb. Optim. ![In: J. Comb. Optim. 45(5), pp. 116, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal |
Shield: Secure Allegation Escrow System with Stronger Guarantees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the ACM Web Conference 2023, WWW 2023, Austin, TX, USA, 30 April 2023 - 4 May 2023, pp. 2252-2262, 2023, ACM, 978-1-4503-9416-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Easwar Vivek Mangipudi, Donghang Lu, Alexandros Psomas 0001, Aniket Kate |
Collusion-Deterrent Threshold Information Escrow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 36th IEEE Computer Security Foundations Symposium, CSF 2023, Dubrovnik, Croatia, July 10-14, 2023, pp. 584-599, 2023, IEEE, 979-8-3503-2192-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Sourabh Bhaskar, Keyur Parmar, Devesh C. Jinwala |
Escrow and Pairing Free CP-ABE Scheme with Forward and Backward Secrecy for Healthcare Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 19th International Conference, ICISS 2023, Raipur, India, December 16-20, 2023, Proceedings, pp. 306-316, 2023, Springer, 978-3-031-49098-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Ryosuke Abe, Seiyo Kurita, Mariko Kobayashi, Shigeya Suzuki |
Mitigation of Seller and Buyer's Dilemma with Transaction History and Escrow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINTEC ![In: Proceedings of the 18th Asian Internet Engineering Conference, AINTEC 2023, Hanoi, Vietnam, December 12-14, 2023, pp. 1-9, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 357 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ >>] |
|