|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 42 occurrences of 27 keywords
|
|
|
Results
Found 111 publication records. Showing 111 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
167 | Jin Li 0002, Fangguo Zhang, Yanming Wang |
A Strong Identity Based Key-Insulated Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings, pp. 352-361, 2006, Springer, 3-540-36850-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Key-insulated cryptosystem, Bilinear pairings, ID-based |
161 | Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Xiangxue Li |
Identity-Based Key-Insulated Signature with Secure Key-Updates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings, pp. 13-26, 2006, Springer, 3-540-49608-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Key-Insulated, Bilinear Pairings, Identity-Based Signature, Key-Exposure |
141 | Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung |
Strong Key-Insulated Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings, pp. 130-144, 2003, Springer, 3-540-00324-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
134 | Benoît Libert, Jean-Jacques Quisquater, Moti Yung |
Parallel Key-Insulated Public Key Encryption Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings, pp. 298-314, 2007, Springer, 978-3-540-71676-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
parallel key-insulated encryption, standard model, pairings |
122 | Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov |
Timed-Release and Key-Insulated Public Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 10th International Conference, FC 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers, pp. 191-205, 2006, Springer, 3-540-46255-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
timed-release, key-insulated encryption, authenticated encryption |
120 | Zhengyi Le, Yi Ouyang 0001, James Ford, Fillia Makedon |
A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings, pp. 280-291, 2004, Springer, 3-540-23208-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
112 | Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung |
Key-Insulated Public Key Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings, pp. 65-82, 2002, Springer, 3-540-43553-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
110 | Dae Hyun Yum, Pil Joong Lee |
Efficient Key Updating Signature Schemes Based on IBS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 9th IMA International Conference, Cirencester, UK, December 16-18, 2003, Proceedings, pp. 167-182, 2003, Springer, 3-540-20663-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Key insulated signature, intrusion resilient siganture, identity based signature |
93 | Go Ohtake, Goichiro Hanaoka, Kazuto Ogawa |
An Efficient Strong Key-Insulated Signature Scheme and Its Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings, pp. 150-165, 2008, Springer, 978-3-540-69484-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
strong key-insulated signature, key leakage, DL assumption, random oracle model, adaptive security |
91 | YoungGyo Lee, Jeonghee Ahn, Seungjoo Kim, Dongho Won |
A PKI System for Detecting the Exposure of a User's Secret Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings, pp. 248-250, 2006, Springer, 3-540-35151-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
key-insulated signature, one-time hash chain, NOVOMODO |
88 | Mihir Bellare, Adriana Palacio |
Protecting against key-exposure: strongly key-insulated encryption with optimal threshold. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Algebra Eng. Commun. Comput. ![In: Appl. Algebra Eng. Commun. Comput. 16(6), pp. 379-396, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Key update, Encryption, Identity-based encryption, Key exposure |
87 | Yuan Zhou, Zhenfu Cao, Zhenchuan Chai |
Identity Based Key Insulated Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings, pp. 226-234, 2006, Springer, 3-540-33052-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
86 | Goichiro Hanaoka, Yumiko Hanaoka, Hideki Imai |
Parallel Key-Insulated Public Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings, pp. 105-122, 2006, Springer, 3-540-33851-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
83 | Weidong Qiu, Yaowei Zhou, Bo Zhu, Yanfei Zheng, Mi Wen, Zheng Gong |
Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, pp. 200-209, 2009, Springer, 978-3-642-02616-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Key-Insulated Encryption, Wireless Sensor Network, Key pre-distribution |
83 | Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai |
Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings, pp. 85-96, 2002, Springer, 3-540-00164-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
75 | Youngho Park 0004, Chul Sur, Chae Duk Jung, Kyung Hyune Rhee |
Efficient Anonymous Authentication Protocol Using Key-Insulated Signature Scheme for Secure VANET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MOBILIGHT ![In: Mobile Lightweight Wireless Systems, First International ICST Conference, MOBILIGHT 2009, Athens, Greece, May 18-20, 2009, Revised Selected Papers, pp. 35-44, 2009, Springer, 978-3-642-03818-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
key-insulated signature, security, authentication, anonymous, vehicular network |
69 | Rupeng Li, Xianghua Du, Guowen Li, Jia Yu 0005, Daxing Li |
Key-Insulated Group Signature Scheme with Selective Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MUE ![In: 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 26-28 April 2007, Seoul, Korea, pp. 1057-1063, 2007, IEEE Computer Society, 978-0-7695-2777-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
65 | Thi Lan Anh Phan, Yumiko Hanaoka, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai |
Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VIETCRYPT ![In: Progressin Cryptology - VIETCRYPT 2006, First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers, pp. 366-384, 2006, Springer, 3-540-68799-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
62 | Nicolás González-Deleito, Olivier Markowitch, Emmanuel Dall'Olio |
A New Key-Insulated Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings, pp. 465-479, 2004, Springer, 3-540-23563-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
key-insulation, forward-security, signature schemes |
58 | Tal Malkin, Satoshi Obana, Moti Yung |
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, pp. 306-322, 2004, Springer, 3-540-21935-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
52 | Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Changshe Ma |
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 409-423, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Parallel Key-Insulation, Bilinear Pairings, Identity-Based Encryption, Key-Exposure |
50 | Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Dong Zheng 0001, Weidong Qiu |
Identity-Based Threshold Key-Insulated Encryption without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings, pp. 203-220, 2008, Springer, 978-3-540-79262-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
threshold key-insulation, standard model, identity-based encryption, key-exposure |
49 | Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai |
A Practical Provider Authentication System for Bidirectional Broadcast Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (3) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007, Proceedings, Part III, pp. 967-974, 2007, Springer, 978-3-540-74828-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
provider authentication, bidirectional broadcasting, key-insulated signature, digital signature |
47 | Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Changshe Ma |
Identity-Based Key-Insulated Signature Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational Intelligence and Security, International Conference, CIS 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers, pp. 470-480, 2006, Springer, 978-3-540-74376-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Gene Itkis, Leonid Reyzin |
SiBIR: Signer-Base Intrusion-Resilient Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings, pp. 499-514, 2002, Springer, 3-540-44050-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
37 | Xingyang Guo, Quan Zhang, Chaojing Tang |
On the Security of Two Key-Updating Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings, pp. 506-517, 2005, Springer, 3-540-26547-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, Hideki Imai |
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004, pp. 360-374, 2004, Springer, 3-540-21018-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Libo He, Chen Yuan 0002, Hu Xiong, Zhiguang Qin |
Certificateless Key Insulated Encryption: Cryptographic Primitive for Achieving Key-escrow free and Key-exposure Resilience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 501, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
36 | Libo He, Chen Yuan 0002, Hu Xiong, Zhiguang Qin |
Certificateless Key-Insulated Encryption: Cryptographic Primitive for Achieving Key-Escrow Free and Key-Exposure Resilience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BigCom ![In: Big Data Computing and Communications - Second International Conference, BigCom 2016, Shenyang, China, July 29-31, 2016. Proceedings, pp. 387-395, 2016, Springer, 978-3-319-42552-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
36 | Thi Lan Anh Phan, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai |
Key-Insulated Public Key Encryption with Auxiliary Helper Key: Model, Constructions and Formal Security Proofs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(9), pp. 1814-1829, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov |
Provably Secure Timed-Release Public Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 11(2), pp. 4:1-4:44, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
key-insulated encryption, timed-release, authenticated encryption |
31 | Jin Wang, Xi Bai 0002, Jia Yu 0005, Daxing Li |
Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TAMC ![In: Theory and Applications of Models of Computation, 4th International Conference, TAMC 2007, Shanghai, China, May 22-25, 2007, Proceedings, pp. 148-158, 2007, Springer, 978-3-540-72503-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
key-insulated cryptosystem, bilinear pairings, Identity-based cryptography, key escrow, key exposure |
30 | Mengting Yao, Qingqing Gan, Xiaoming Wang, Yuhao Yang |
A key-insulated secure multi-server authenticated key agreement protocol for edge computing-based VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Things ![In: Internet Things 21, pp. 100679, April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
30 | Chunping Zhu, Xingkai Wang, Zhen Liu 0008 |
Universally Composable Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt (1) ![In: Information Security and Cryptology - 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part I, pp. 44-64, 2023, Springer, 978-981-97-0941-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
30 | Zhen Liu 0008, Guomin Yang, Duncan S. Wong, Khoa Nguyen 0002, Huaxiong Wang, Xiaorong Ke, Yining Liu |
Secure Deterministic Wallet and Stealth Address: Key-Insulated and Privacy-Preserving Signature Scheme With Publicly Derived Public Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 19(5), pp. 2934-2951, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
30 | Yingzhe Hou, Hu Xiong, Xin Huang, Saru Kumari |
Certificate-Based Parallel Key-Insulated Aggregate Signature Against Fully Chosen Key Attacks for Industrial Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 8(11), pp. 8935-8948, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
30 | Hu Xiong, Yingzhe Hou, Xin Huang, Saru Kumari |
Certificate-Based Parallel Key-Insulated Aggregate Signature Against Fully Chosen-Key Attacks for Industrial Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2020, pp. 1027, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
30 | Wenling Liu, Zhen Liu 0008, Khoa Nguyen 0002, Guomin Yang, Yu Yu 0001 |
A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS (2) ![In: Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part II, pp. 357-377, 2020, Springer, 978-3-030-59012-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
30 | Zhen Liu 0008, Guomin Yang, Duncan S. Wong, Khoa Nguyen 0002, Huaxiong Wang |
Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroS&P ![In: IEEE European Symposium on Security and Privacy, EuroS&P 2019, Stockholm, Sweden, June 17-19, 2019, pp. 215-230, 2019, IEEE, 978-1-7281-1148-3. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
30 | Zhen Liu 0008, Guomin Yang, Duncan S. Wong, Khoa Nguyen 0002, Huaxiong Wang |
Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 956, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
30 | Hanshu Hong, Zhixin Sun, Ximeng Liu |
A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KSII Trans. Internet Inf. Syst. ![In: KSII Trans. Internet Inf. Syst. 10(5), pp. 2394-2406, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Yevgeniy Dodis, Weiliang Luo, Shouhuai Xu, Moti Yung |
Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012, pp. 57-58, 2012, ACM, 978-1-4503-1648-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
30 | Takenobu Seito, Junji Shikata |
Information-theoretically secure key-insulated key-agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITW ![In: 2011 IEEE Information Theory Workshop, ITW 2011, Paraty, Brazil, October 16-20, 2011, pp. 287-291, 2011, IEEE, 978-1-4577-0438-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
30 | Renwang Su |
New Key Insulated Signature Scheme : Mitigate the Damage of Key Exposure in Mobile Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD (2) ![In: Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2007, July 30 - August 1, 2007, Qingdao, China, pp. 126-131, 2007, IEEE Computer Society, 0-7695-2909-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov |
Timed-Release and Key-Insulated Public Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2004, pp. 231, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
30 | Mihir Bellare, Adriana Palacio |
Protecting against Key Exposure: Strongly Key-Insulated Encryption with Optimal Threshold. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2002, pp. 64, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
30 | Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung |
Key-Insulated Public-Key Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2002, pp. 77, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
27 | Satoshi Koga, Kouichi Sakurai |
A Distributed Online Certificate Status Protocol with a Single Public Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004, pp. 389-401, 2004, Springer, 3-540-21018-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Min Liu, Liangliang Wang, Kai Zhang, Yu Long, Baodong Qin |
A pairing-free certificate-based key-insulated aggregate signature scheme for wireless medical sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Peer Peer Netw. Appl. ![In: Peer Peer Netw. Appl. 17(2), pp. 685-700, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
24 | Jie Cui 0004, Jie Lu, Hong Zhong 0001, Qingyang Zhang, Chengjie Gu, Lu Liu 0001 |
Parallel Key-Insulated Multiuser Searchable Encryption for Industrial Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Informatics ![In: IEEE Trans. Ind. Informatics 18(7), pp. 4875-4883, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Punugu Vasudeva Reddy, A. Ramesh Babu 0001, N. B. Gayathri 0001 |
Pairing-based strong key-insulated signature scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Comput. Secur. ![In: Int. J. Inf. Comput. Secur. 18(1/2), pp. 148-164, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Justice Odoom, Xiaofang Huang, Licheng Wang |
Stateless forward-secure key-insulated linkable ring signature scheme in ID-based setting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Archit. ![In: J. Syst. Archit. 129, pp. 102600, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Minghao Yang, Jinhao Chen, Yanan Chen, Rong Ma, Sachin Kumar 0002 |
Strong key-insulated secure and energy-aware certificateless authentication scheme for VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Electr. Eng. ![In: Comput. Electr. Eng. 95, pp. 107417, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Punugu Vasudeva Reddy, A. Ramesh Babu 0001, N. B. Gayathri 0001 |
Efficient and Secure Identity-based Strong Key-Insulated Signature Scheme without Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. King Saud Univ. Comput. Inf. Sci. ![In: J. King Saud Univ. Comput. Inf. Sci. 33(10), pp. 1211-1218, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Seth Alornyo, Yanan Zhao, Guobin Zhu, Hu Xiong |
Identity Based Key-Insulated Encryption with Outsourced Equality Test. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 22(2), pp. 257-264, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
24 | Hu Xiong, Qian Mei, Yanan Zhao |
Efficient and Provably Secure Certificateless Parallel Key-Insulated Signature Without Pairing for IIoT Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Syst. J. ![In: IEEE Syst. J. 14(1), pp. 310-320, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
24 | A. Ramesh Babu 0001, N. B. Gayathri 0001, Punugu Vasudeva Reddy |
Efficient and secure pairing-free certificateless strong key-insulated signature scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Knowl. Based Intell. Eng. Syst. ![In: Int. J. Knowl. Based Intell. Eng. Syst. 23(3), pp. 155-166, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Hanshu Hong, Zhixin Sun |
Sharing your privileges securely: a key-insulated attribute based proxy re-encryption scheme for IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
World Wide Web ![In: World Wide Web 21(3), pp. 595-607, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Y. Sreenivasa Rao |
Signature-policy attribute-based key-insulated signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 11(1), pp. 23-33, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Libo He, Chen Yuan 0002, Hu Xiong, Zhiguang Qin |
An Efficient and Provably Secure Certificateless Key Insulated Encryption with Applications to Mobile Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 19(6), pp. 940-949, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
24 | Yilei Wang, Dongjie Yan, Fagen Li, Hu Xiong |
A Key-insulated Proxy Re-encryption Scheme for Data Sharing in a Cloud Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 19(4), pp. 623-630, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
24 | Punugu Vasudeva Reddy, P. V. S. S. N. Gopal |
Identity-based key-insulated aggregate signature scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. King Saud Univ. Comput. Inf. Sci. ![In: J. King Saud Univ. Comput. Inf. Sci. 29(3), pp. 303-310, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Hanshu Hong, Zhixin Sun |
Efficient key insulated attribute based signature without bilinear pairings for mobile communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Autom. Control. Comput. Sci. ![In: Autom. Control. Comput. Sci. 51(3), pp. 159-166, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Hanshu Hong, Zhixin Sun |
A Key-Insulated Ciphertext Policy Attribute Based Signcryption for Mobile Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 95(2), pp. 1215-1228, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Caixue Zhou, Zhiqiang Zhao, Wan Zhou, Yuan Mei |
Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 2017, pp. 8405879:1-8405879:17, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Yang Lu 0001, Jiguo Li 0001, Jian Shen 0001 |
Weakness and Improvement of a Certificate-Based Key-Insulated Signature in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. J. ![In: Comput. J. 60(12), pp. 1729-1744, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Nobuaki Kitajima, Naoto Yanai, Takashi Nishide |
Identity-Based Key-Insulated Aggregate Signatures, Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology - 13th International Conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected Papers, pp. 141-156, 2017, Springer, 978-3-319-75159-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Y. Sreenivasa Rao, Ratna Dutta |
Attribute-based key-insulated signature for boolean formula. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Comput. Math. ![In: Int. J. Comput. Math. 93(6), pp. 864-888, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Y. Sreenivasa Rao, Ratna Dutta |
Bandwidth-efficient attribute-based key-insulated signatures with message recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 369, pp. 648-673, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Jiguo Li 0001, Haiting Du, Yichen Zhang 0003 |
Certificate-Based Key-Insulated Signature in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. J. ![In: Comput. J. 59(7), pp. 1028-1039, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Yang Shi 0002, Jie Lin, Guoyue Xiong, Xiaoping Wang, Hongfei Fan |
Key-Insulated Undetachable Digital Signature Scheme and Solution for Secure Mobile Agents in Electronic Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Inf. Syst. ![In: Mob. Inf. Syst. 2016, pp. 4375072:1-4375072:18, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Yohei Watanabe 0001, Junji Shikata |
Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I, pp. 255-279, 2016, Springer, 978-3-662-49383-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Yang Lu 0001, Quanling Zhang, Jiguo Li 0001 |
An improved certificateless strong key-insulated signature scheme in the standard model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adv. Math. Commun. ![In: Adv. Math. Commun. 9(3), pp. 353-373, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Hu Xiong, Shikun Wu, Ji Geng 0001, Emmanuel Ahene, Songyang Wu, Zhiguang Qin |
A Pairing-free Key-insulated Certificate-based Signature Scheme with Provable Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KSII Trans. Internet Inf. Syst. ![In: KSII Trans. Internet Inf. Syst. 9(3), pp. 1246-1259, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Yohei Watanabe 0001, Junji Shikata |
Identity-based Hierarchical Key-insulated Encryption without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 1254, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
24 | Yanan Chen, Weixiang Xu, Hu Xiong |
Strongly secure certificateless key-insulated signature secure in the standard model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. des Télécommunications ![In: Ann. des Télécommunications 70(9-10), pp. 395-405, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Feng Wang 0020, Li Xu 0002, Jeng-Shyang Pan 0001 |
Security Analysis on "Strongly Secure Certificateless Key-Insulated Signature Secure in the Standard Model". ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2015, Adelaide, Australia, September 23-25, 2015, pp. 195-198, 2015, IEEE, 978-1-5090-0188-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Jiguo Li 0001, Haiting Du, Yichen Zhang 0003, Tao Li, Yuexin Zhang |
Provably secure certificate-based key-insulated signature scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 26(8), pp. 1546-1560, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
24 | Jianhong Chen, Yu Long 0001, Kefei Chen, Jie Guo |
Attribute-based key-insulated signature and its applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 275, pp. 57-67, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
24 | Guobin Zhu, Hu Xiong, Zhiguang Qin |
Fully Secure Identity Based Key-Insulated Signcryption in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 79(2), pp. 1401-1416, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
24 | Huiyan Zhao, Jia Yu 0005, Shaoxia Duan, Xiangguo Cheng, Rong Hao |
Key-insulated aggregate signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Frontiers Comput. Sci. ![In: Frontiers Comput. Sci. 8(5), pp. 837-846, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
24 | Y. Sreenivasa Rao, Ratna Dutta |
Attribute Based Key-Insulated Signatures with Message Recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security - 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers, pp. 215-229, 2014, Springer, 978-3-319-21965-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
24 | Jia Fan, Yuliang Zheng 0001, Xiaohu Tang |
Key-Insulated Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Univers. Comput. Sci. ![In: J. Univers. Comput. Sci. 19(10), pp. 1351-1374, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Zhong-Mei Wan, Jiguo Li 0001, Xuan Hong |
Parallel key-insulated signature scheme without random oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Commun. Networks ![In: J. Commun. Networks 15(3), pp. 252-257, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Chien-Lung Hsu, Han-Yu Lin |
An Identity-Based Key-Insulated Encryption with Message Linkages for Peer-to-Peer Communication Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KSII Trans. Internet Inf. Syst. ![In: KSII Trans. Internet Inf. Syst. 7(11), pp. 2928-2940, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Yanli Ren, Shuozhong Wang, Xinpeng Zhang 0001 |
Practical parallel key-insulated encryption with multiple helper keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Math. Appl. ![In: Comput. Math. Appl. 65(9), pp. 1403-1412, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Atsuko Miyaji, Mohammad Shahriar Rahman |
KIMAP: Key-Insulated Mutual Authentication Protocol for RFID ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1209.5388, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
24 | Jianhong Chen, Kefei Chen, Yongtao Wang, Xiangxue Li, Yu Long 0001, Zhongmei Wan |
Identity-Based Key-Insulated Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Informatica ![In: Informatica 23(1), pp. 27-45, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
24 | Haiting Du, Jiguo Li 0001, Yichen Zhang 0003, Tao Li, Yuexin Zhang |
Certificate-Based Key-Insulated Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDKE ![In: Data and Knowledge Engineering - Third International Conference, ICDKE 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings, pp. 206-220, 2012, Springer, 978-3-642-34678-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
24 | Jian-Hong Chen, Yong-Tao Wang, Ke-Fei Chen |
Attribute-Based Key-Insulated Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Sci. Eng. ![In: J. Inf. Sci. Eng. 27(2), pp. 437-449, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
24 | Chien-Lung Hsu, Han-Yu Lin |
New identity-based key-insulated convertible multi-authenticated encryption scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Comput. Appl. ![In: J. Netw. Comput. Appl. 34(5), pp. 1724-1731, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Han-Yu Lin, Chien-Lung Hsu |
A Novel Identity-Based Key-Insulated Convertible Authenticated Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Found. Comput. Sci. ![In: Int. J. Found. Comput. Sci. 22(3), pp. 739-756, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Xu An Wang 0001, Jian Weng 0001, Xiaoyuan Yang 0002, Minqing Zhang |
Cryptanalysis of an (hierarchical) identity based parallel key-insulated encryption scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Softw. ![In: J. Syst. Softw. 84(2), pp. 219-225, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Zhongmei Wan |
A New Identity-Based Parallel Key-Insulated Signature Scheme without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCID (2) ![In: 4th International Symposium on Computational Intelligence and Design, ISCID 2011, Hangzhou, China, October 28-30, 2011, 2 Volumes, pp. 27-30, 2011, IEEE Computer Society, 978-1-4577-1085-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Huaqun Wang, Yuqing Zhang 0001 |
Identity-Based Strong Key-Insulated Ring Signature Scheme in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSN ![In: Seventh International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2011, Beijing, China, December 16-18, 2011, pp. 451-455, 2011, IEEE Computer Society, 978-1-4577-2178-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Goichiro Hanaoka, Jian Weng 0001 |
Generic Constructions of Parallel Key-Insulated Encryption: Stronger Security Model and Novel Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2010, pp. 468, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
24 | Yanli Ren, Dawu Gu |
CCA2 secure (hierarchical) identity-based parallel key-insulated encryption without random oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Softw. ![In: J. Syst. Softw. 83(1), pp. 153-162, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Le Trieu Phong, Shin'ichiro Matsuo, Moti Yung |
Leakage Resilient Strong Key-Insulated Signatures in Public Channel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTRUST ![In: Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers, pp. 160-172, 2010, Springer, 978-3-642-25282-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Goichiro Hanaoka, Jian Weng 0001 |
Generic Constructions of Parallel Key-Insulated Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010. Proceedings, pp. 36-53, 2010, Springer, 978-3-642-15316-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Takenobu Seito, Tadashi Aikawa, Junji Shikata, Tsutomu Matsumoto |
Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings, pp. 148-165, 2010, Springer, 978-3-642-12677-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 111 (100 per page; Change: ) Pages: [ 1][ 2][ >>] |
|