Results
Found 166 publication records. Showing 166 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
56 | Mihir Bellare, Bennet S. Yee |
Forward-Security in Private-Key Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings, pp. 1-18, 2003, Springer, 3-540-00847-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
pseudorandom bit generators, message authentication, forward security, Symmetric cryptography, audit logs, proofs of security |
47 | Guilin Wang |
On the Security of a Group Signature Scheme with Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers, pp. 27-39, 2003, Springer, 3-540-21376-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
cryptanalysis, digital signature, group signature, forward security |
47 | N. R. Sunitha, B. B. Amberker |
Forward-Secure Multi-signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCIT ![In: Distributed Computing and Internet Technology, 5th International Conference, ICDCIT 2008, New Delhi, India, December 10-12, 2008. Proceedings, pp. 89-99, 2008, Springer, 978-3-540-89736-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Serial multi-signature, Parallel multi-signature, Digital Signature, Forward-Security, e-banking, ElGamal Signatures |
45 | Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya |
ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 354-363, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
ID-Based encryption, broadcast encryption, forward security |
44 | Xavier Boyen, Hovav Shacham, Emily Shen, Brent Waters |
Forward-secure signatures with untrusted update. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006, pp. 191-200, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
untrusted storage, digital signatures, forward security, two-factor authentication |
41 | Ran Canetti, Shai Halevi, Jonathan Katz |
A Forward-Secure Public-Key Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings, pp. 255-271, 2003, Springer, 3-540-14039-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Bilinear Diffie-Hellman, Encryption, Forward security, Key exposure |
40 | Benoît Libert, Moti Yung |
Dynamic fully forward-secure group signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010, pp. 70-81, 2010, ACM, 978-1-60558-936-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
key protection, anonymity, security modeling, group signatures, forward security, key exposure |
38 | Jianhong Zhang, Qianhong Wu, Yumin Wang |
A Novel Efficient Group Signature Scheme with Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings, pp. 292-300, 2003, Springer, 3-540-20150-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
anonymity, revocation, forward security, unlinkability, Group signature scheme |
37 | Wen-Guey Tzeng, Zhi-Jia Tzeng |
Robust Forward-Secure Signature Schemes with Proactive Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings, pp. 264-276, 2001, Springer, 3-540-41658-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
signature, threshold, forward security, proactive |
36 | Michel Abdalla, Leonid Reyzin |
A New Forward-Secure Digital Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings, pp. 116-129, 2000, Springer, 3-540-41404-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
proven security, digital signatures, forward security, concrete security |
35 | Basel Alomair, Krishna Sampigethaya, Radha Poovendran |
Efficient Generic Forward-Secure Signatures and Proxy Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings, pp. 166-181, 2008, Springer, 978-3-540-69484-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
efficiency, Digital signatures, proxy, forward-security |
34 | Jia Yu 0003, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li |
Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings, pp. 176-184, 2008, Springer, 978-3-540-88732-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
digital signature, provable security, forward security, key exposure |
34 | Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Kam-Pui Chow |
Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers, pp. 352-369, 2003, Springer, 3-540-21376-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Identity-based signcryption, public ciphertext authenticity, network security, provable security, firewalls, elliptic curve cryptosystems, public key cryptosystems, forward security, semantical security, cryptographic primitives, public verifiability |
32 | Duc-Liem Vo, Kwangjo Kim |
Yet Another Forward Secure Signature from Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers, pp. 441-455, 2005, Springer, 3-540-33354-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
key evolution, pairings, Forward security, key exposure |
31 | Shuhong Wang 0001, Feng Bao 0001, Robert H. Deng |
Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings, pp. 53-60, 2005, Springer, 3-540-30934-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Provable security, Forward security, Blind signature, Strong RSA assumption |
29 | Gene Tsudik |
Weak Forward Security in Mediated RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 45-54, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
29 | Dawn Xiaodong Song |
Practical forward secure group signature schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS 2001, Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001., pp. 225-234, 2001, ACM, 1-58113-385-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
29 | Zhenchuan Chai, Zhenfu Cao |
Factoring-Based Proxy Signature Schemes with Forward-Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational and Information Science, First International Symposium, CIS 2004, Shanghai, China, December 16-18, 2004, Proceedings, pp. 1034-1040, 2004, Springer, 3-540-24127-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Di Ma |
Practical forward secure sequential aggregate signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, pp. 341-352, 2008, ACM, 978-1-59593-979-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
forward secure sequential aggregate authentication, quality of forward security, MAC, signature |
28 | Di Ma, Gene Tsudik |
Extended Abstract: Forward-Secure Sequential Aggregate Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2007 IEEE Symposium on Security and Privacy (S&P 2007), 20-23 May 2007, Oakland, California, USA, pp. 86-91, 2007, IEEE Computer Society, 0-7695-2848-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
key compromise, sensors, forward security, signature schemes, authentication schemes, aggregate signatures |
28 | Nicolás González-Deleito, Olivier Markowitch, Emmanuel Dall'Olio |
A New Key-Insulated Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings, pp. 465-479, 2004, Springer, 3-540-23563-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
key-insulation, forward-security, signature schemes |
28 | Michel Abdalla, Sara K. Miner, Chanathip Namprempre |
Forward-Secure Threshold Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2001, The Cryptographer's Track at RSA Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings, pp. 441-456, 2001, Springer, 3-540-41898-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
proactive cryptography, forward security, threshold cryptography, signature schemes |
27 | Ran Canetti, Dror Eiger, Shafi Goldwasser, Dah-Yoh Lim |
How to Protect Yourself without Perfect Shredding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP (2) ![In: Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming & Track C: Security and Cryptography Foundations, pp. 511-523, 2008, Springer, 978-3-540-70582-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
intrusion resilience, partial erasures, forward security, secure multiparty computation, randomness extractors, universal hashing, adaptive security, proactive security, mobile adversary |
25 | Marek Klonowski, Miroslaw Kutylowski, Michal Ren, Katarzyna Rybarczyk |
Forward-Secure Key Evolution in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings, pp. 102-120, 2007, Springer, 978-3-540-76968-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
communication in sensor networks, directed random graphs, key management, key distribution, forward security |
25 | Tri Van Le, Mike Burmester, Breno de Medeiros |
Universally composable and forward-secure RFID authentication and authenticated key exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 242-252, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
RFID authentication and key-exchange protocols, anonymity, forward-security, universal composability |
24 | Xuanwu Zhou, Xiaoyuan Yang 0002, Ping Wei 0005, Yupu Hu |
Dynamic Group Signature with Forward Security and Its Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC ![In: Grid and Cooperative Computing, Sixth International Conference on Grid and Cooperative Computing, GCC 2007, August 16-18, 2007, Urumchi, Xinjiang, China, Proceedings, pp. 473-480, 2007, IEEE Computer Society, 0-7695-2871-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | N. R. Sunitha, B. B. Amberker, Prashant Koulgi |
Secure E-cheques for Joint Accounts with Collective Signing Using Forward-Secure Multi-signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 7th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2008, 14-16 May 2008, Portland, Oregon, USA, pp. 241-246, 2008, IEEE Computer Society, 978-0-7695-3131-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
e-cheque, Parallel multi-signature, Digital Signature, Forward-Security, ElGamal Signatures |
22 | Meng Wang, Hui Li 0006, Zhijing Liu |
Efficient Identity Based Proxy-Signcryption Schemes with Forward Security and Public Verifiability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCNMC ![In: Networking and Mobile Computing, Third International Conference, ICCNMC 2005, Zhangjiajie, China, August 2-4, 2005, Proceedings, pp. 982-991, 2005, Springer, 3-540-28102-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Pei-Yih Ting, Fang-Dar Chu |
Enhancing the Security Promise of a Digital Time-Stamp. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 22nd International Conference on Advanced Information Networking and Applications, AINA 2008, GinoWan, Okinawa, Japan, March 25-28, 2008, pp. 342-347, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
hierarchical distributed time source, forward-secure digital signature, PKI, time-stamps |
21 | Simon R. Blackburn, Keith M. Martin, Maura B. Paterson, Douglas R. Stinson |
Key Refreshing in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITS ![In: Information Theoretic Security, Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008, Proceedings, pp. 156-170, 2008, Springer, 978-3-540-85092-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
key refreshing, wireless sensor networks, forward security |
19 | Zhenchuan Chai, Zhenfu Cao, Rongxing Lu |
Remote Authentication with Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006, Proceedings, pp. 418-427, 2006, Springer, 3-540-38619-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Tal Malkin, Daniele Micciancio, Sara K. Miner |
Efficient Generic Forward-Secure Signatures with an Unbounded Number Of Time Periods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings, pp. 400-417, 2002, Springer, 3-540-43553-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
18 | Gene Itkis |
Intrusion-Resilient Signatures: Generic Constructions, or Defeating Strong Adversary with Minimal Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 102-118, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Hua Guo, Yi Mu 0001, Xiyong Zhang, Zhoujun Li 0001 |
Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UIC ![In: Ubiquitous Intelligence and Computing, 6th International Conference, UIC 2009, Brisbane, Australia, July 7-9, 2009. Proceedings, pp. 310-324, 2009, Springer, 978-3-642-02829-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Master key forward secrecy, Provable security, Weil pairing, Authenticated key agreement |
17 | Leo Dorrendorf, Zvi Gutterman, Benny Pinkas |
Cryptanalysis of the windows random number generator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 476-485, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
pseudo random number generator (prng), windows operating system, cryptanalysis |
16 | Rongxing Lu, Xiaodong Lin 0001, Haojin Zhu, Pin-Han Ho, Xuemin Shen, Zhenfu Cao |
A New Dynamic Group Key Management Scheme with Low Rekeying Cost. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNC ![In: WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008 - April 3 2008, Las Vegas, Nevada, USA, Conference Proceedings, pp. 3243-3248, 2008, IEEE, 978-1-4244-1997-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Ran Canetti, Shai Halevi, Jonathan Katz |
A Forward-Secure Public-Key Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 20(3), pp. 265-294, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Ziming Song, Chunqing Wu, Zhu Tang |
An Efficient Group Signature Scheme in Ferry-Based Delay-Tolerant Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010, pp. 2816-2821, 2010, IEEE Computer Society, 978-0-7695-4108-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Ferry, Signature of Knowledge (SoK), DTN, Group signature, Forward-security |
16 | Santi Martínez, Magda Valls, Concepció Roig, Josep M. Miret, Francesc Giné |
A Secure Elliptic Curve-Based RFID Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 24(2), pp. 309-318, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
RFID, elliptic curve cryptography, zero knowledge, forward security |
16 | Chuankun Wu |
Set signatures and their applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 52(8), pp. 1346-1357, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
set signature, cryptography, forward security |
16 | Xuanwu Zhou, Yang Su, Ping Wei 0005 |
Further Study on Proxy Authorization and Its Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Complex (2) ![In: Complex Sciences, First International Conference, Complex 2009, Shanghai, China, February 23-25, 2009. Revised Papers, Part 2, pp. 1701-1718, 2009, Springer, 978-3-642-02468-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Proxy authorization, multi-party authorization, multicast communi-cation, forward security, BAN logic |
16 | Toru Nakanishi 0001, Yuta Hira, Nobuo Funabiki |
Forward-Secure Group Signatures from Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pairing ![In: Pairing-Based Cryptography - Pairing 2009, Third International Conference, Palo Alto, CA, USA, August 12-14, 2009, Proceedings, pp. 171-186, 2009, Springer, 978-3-642-03297-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anonymity, group signatures, pairings, forward-security |
16 | Wei Du, Mingxing He, Xiao Li |
A New Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICA3PP ![In: Algorithms and Architectures for Parallel Processing, 9th International Conference, ICA3PP 2009, Taipei, Taiwan, June 8-11, 2009. Proceedings, pp. 832-843, 2009, Springer, 978-3-642-03094-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Self-healing Key Distribution, Constant Storage, Backward Security, Forward Security, WSNs |
16 | Zhengyi Le, Matt Bishop, Fillia Makedon |
Strong mobile device protection from loss and capture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PETRA ![In: Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments, PETRA 2009, Corfu, Greece, June 9-13, 2009, 2009, ACM, 978-1-60558-409-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
authentication, mobile device, digital signature, forward security, assistive environment |
16 | Jia Yu 0003, Fanyu Kong, Rong Hao, Dexiang Zhang |
Construction of Server-assisted Forward Secure Signature Using Bellare-Miner Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 558-561, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
server-assisted signature, security, forward security |
16 | Yvo Desmedt, Tanja Lange 0001 |
Revisiting Pairing Based Group Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers, pp. 53-68, 2008, Springer, 978-3-540-85229-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Authentication, Key Distribution, Pairings, Forward Security, Group Key Exchange |
16 | Xiangsheng Xia, Hongyun Wan, Fan Hong, Guohua Cui |
Cryptanalysis of an Improved Forward Secure Proxy Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PACIIA (1) ![In: PACIIA 2008, Volume 1, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, 19-20 December 2008, Wuhan, China, pp. 524-528, 2008, IEEE Computer Society, 978-0-7695-3490-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
cryptanalysis, security analysis, forward security, proxy signature |
16 | Zhengyi Le, Yi Ouyang 0001, Yurong Xu, Fillia Makedon |
Mobile device protection from loss and capture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PETRA ![In: Proceedings of the 1st ACM International Conference on Pervasive Technologies Related to Assistive Environments, PETRA 2008, Athens, Greece, July 16-18, 2008, pp. 41, 2008, ACM, 978-1-60558-067-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authentication, mobile device, digital signature, forward security, assistive environment |
16 | Jia Yu 0003, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li |
Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings, pp. 83-97, 2008, Springer, 978-3-540-88732-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
digital signature, forward security, bilinear maps, computation Diffie-Hellman problem |
16 | Jia Yu 0003, Fanyu Kong, Rong Hao, Xuliang Li 0001 |
How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI Workshops ![In: Intelligence and Security Informatics, IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings, pp. 138-148, 2008, Springer, 978-3-540-69136-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
digital signature, forward security, bilinear maps, Computation Diffie-Hellman problem |
16 | Yvo Desmedt, Tanja Lange 0001, Mike Burmester |
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers, pp. 104-118, 2007, Springer, 978-3-540-77365-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Tree based GKE, Ad-Hoc Groups, Authentication, Anonymity, Key Distribution, Forward Security, Group Key Exchange |
16 | Jin Zhou, Yuefei Zhu, TingMao Chang, YaJuan Zhang |
Universally Composable Key-Evolving Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISIM ![In: 6th International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2007, Elk, Poland, June 28-30, 2007, pp. 97-102, 2007, IEEE Computer Society, 0-7695-2894-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Ideal functionality, EUF-ACMA, Key-evolving, Digital signature, Forward-security, Universally composable |
16 | Deholo Nali, Carlisle M. Adams, Ali Miri |
Hierarchical time-based information release. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 5(2), pp. 92-104, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Time-Based access control, Constant-length ciphertext, Constant-time Decryption, Forward security, Hierarchical identity-Based encryption |
16 | Shouhuai Xu |
On the security of group communication schemes based on symmetric key cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SASN ![In: Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2005, Alexandria, VA, USA, November 7, 2005, pp. 22-31, 2005, ACM, 1-59593-227-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
backward-security, security, key management, group communication, broadcast encryption, forward-security |
15 | Kitae Kim, Ikkwon Yie, Daehun Nyang |
On the Security of Two Group Signature Schemes with Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Informatica (Slovenia) ![In: Informatica (Slovenia) 34(2), pp. 237-242, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
15 | Michel Abdalla, Jee Hea An, Mihir Bellare, Chanathip Namprempre |
From Identification to Signatures Via the Fiat-Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 54(8), pp. 3631-3646, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee 0001, Jongin Lim 0001, Kilsoo Chun |
Fine Grained Control of Security Capability and Forward Security in a Pairing Based Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part II, pp. 381-390, 2005, Springer, 3-540-25861-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
15 | Guilin Wang |
On the Security of a Group Signature Scheme with Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2003, pp. 226, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
15 | Michel Abdalla, Jee Hea An, Mihir Bellare, Chanathip Namprempre |
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2002, pp. 22, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
15 | Michel Abdalla, Jee Hea An, Mihir Bellare, Chanathip Namprempre |
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings, pp. 418-433, 2002, Springer, 3-540-43553-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
15 | Shuang Xiang, Mingdi Xu, Li Wang, Huanguo Zhang |
Design Secure Contexts Detect Based on Lattice for Grid Computing Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 110-113, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security class, grid computing, context-aware, information flow, lattice |
13 | Mike Burmester, Breno de Medeiros, Rossana Motta |
Provably Secure Grouping-Proofs for RFID Tags. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CARDIS ![In: Smart Card Research and Advanced Applications, 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings, pp. 176-190, 2008, Springer, 978-3-540-85892-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Kyosuke Osaka, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi |
An Efficient and Secure RFID Security Method with Ownership Transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational Intelligence and Security, International Conference, CIS 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers, pp. 778-787, 2006, Springer, 978-3-540-74376-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Jihwan Lim, Heekuck Oh, Sangjin Kim |
A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 278-289, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Authentication, RFID, User Privacy |
13 | Alireza Sadighian, Rasool Jalili |
FLMAP: A fast lightweight mutual authentication protocol for RFID systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICON ![In: Proceedings of the 16th International Conference on Networks, ICON 2008, December 12-14, 2008, held at India Habitat Centre, New Delhi, India, pp. 1-6, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Nuttapong Attrapadung, Jun Furukawa 0001, Hideki Imai |
Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings, pp. 161-177, 2006, Springer, 3-540-49475-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung |
Intrusion-Resilient Public-Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings, pp. 19-32, 2003, Springer, 3-540-00847-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
11 | Hsing-Bai Chen, Wei-Bin Lee, Yong-Hong Zhao, Yin-Long Chen |
Enhancement of the RFID security method with ownership transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUIMC ![In: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC 2009, Suwon, Korea, January 15-16, 2009, pp. 251-254, 2009, ACM, 978-1-60558-405-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
integrity, efficiency, RFID system, ownership transfer |
11 | Sjouke Mauw, Ivo van Vessem, Bert Bos |
Forward Secure Communication in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings, pp. 32-42, 2006, Springer, 3-540-33376-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Erik-Oliver Blass, Guevara Noubir |
Forward Security with Crash Recovery for Secure Logs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Priv. Secur. ![In: ACM Trans. Priv. Secur. 27(1), pp. 3:1-3:28, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Lei Meng, Haitao Xu 0001, Runze Tang, Xianwei Zhou, Zhu Han 0001 |
Dual Hybrid CP-ABE: How to Provide Forward Security Without a Trusted Authority in Vehicular Opportunistic Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 11(5), pp. 8800-8814, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Fengyin Li, Junhui Wang, Zhihao Song |
Privacy Protection of Cloud Computing Based on Strong Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Cloud Appl. Comput. ![In: Int. J. Cloud Appl. Comput. 13(1), pp. 1-9, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Shiyuan Xu, Yibo Cao, Xue Chen, Siu-Ming Yiu, Yanmin Zhao |
Post-Quantum Public-key Authenticated Searchable Encryption with Forward Security: General Construction, Implementation, and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 591, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
11 | Shuangrong Peng, Xiaohu Tang, Ling Xiong, Hui Zhu 0006 |
LGAAFS: A lightweight group anonymous mutual authentication and forward security scheme for wireless body area networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Peer Peer Netw. Appl. ![In: Peer Peer Netw. Appl. 16(5), pp. 2474-2491, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Christian Göth, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks, Erkan Tairi, Alexander Zikulnig |
Optimizing 0-RTT Key Exchange with Full Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCSW@CCS ![In: Proceedings of the 2023 on Cloud Computing Security Workshop, CCSW 2023, Copenhagen, Denmark, 26 November 2023, pp. 55-68, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Shiyuan Xu, Yibo Cao, Xue Chen, Yanmin Zhao, Siu-Ming Yiu |
Post-Quantum Public-Key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt (1) ![In: Information Security and Cryptology - 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part I, pp. 274-298, 2023, Springer, 978-981-97-0941-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Daniel Slamanig, Christoph Striecks |
Revisiting Updatable Encryption: Controlled Forward Security, Constructions and a Puncturable Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC (2) ![In: Theory of Cryptography - 21st International Conference, TCC 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part II, pp. 220-250, 2023, Springer, 978-3-031-48617-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Navya Sivaraman, Simin Nadjm-Tehrani |
5G Handover: When Forward Security Breaks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: Proceedings of the 20th International Conference on Security and Cryptography, SECRYPT 2023, Rome, Italy, July 10-12, 2023., pp. 503-510, 2023, SCITEPRESS, 978-989-758-666-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Yang Tao 0001, Rui Zhang 0002, Yunfeng Ji |
Forward Security of Fiat-Shamir Lattice Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS (1) ![In: Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part I, pp. 607-633, 2023, Springer, 978-3-031-33487-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Suvradip Chakraborty, Harish Karthikeyan, Adam O'Neill, C. Pandu Rangan |
Forward Security Under Leakage Resilience, Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 22nd International Conference, CANS 2023, Augusta, GA, USA, October 31 - November 2, 2023, Proceedings, pp. 3-27, 2023, Springer, 978-981-99-7562-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Fengyin Li, Zhongxing Liu, Tao Li 0043, Hongwei Ju, Hua Wang, Huiyu Zhou 0001 |
Privacy-aware PKI model with strong forward security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Intell. Syst. ![In: Int. J. Intell. Syst. 37(12), pp. 10049-10065, December 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Xiaoling Yu, Lei Xu 0019, Xin Huang, Chungen Xu |
An Efficient Lattice-Based Encrypted Search Scheme with Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Network and System Security - 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings, pp. 712-726, 2022, Springer, 978-3-031-23019-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Priyanka Dutta 0001, Mei Jiang, Dung Hoang Duong, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto |
Hierarchical Identity-based Puncturable Encryption from Lattices with Application to Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022, pp. 408-422, 2022, ACM, 978-1-4503-9140-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Yijian Lin, Xiaoming Wang 0004, Qingqing Gan, Mengting Yao |
A secure cross-domain authentication scheme with perfect forward security and complete anonymity in fog computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 63, pp. 103022, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
11 | Yuan Li, Xing-Chen Wang, Lin Huang, Yunlei Zhao |
Order-Revealing Encryption: File-Injection Attack and Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 36(4), pp. 877-895, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
11 | Nimrod Aviram, Kai Gellert, Tibor Jager |
Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 34(3), pp. 20, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
11 | Meixia Miao, Yunling Wang, Jianfeng Wang, Xinyi Huang 0001 |
Verifiable database supporting keyword searches with forward security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Stand. Interfaces ![In: Comput. Stand. Interfaces 77, pp. 103491, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
11 | Colin Boyd, Gareth T. Davies, Bor de Kock, Kai Gellert, Tibor Jager, Lise Millerjord |
Symmetric Key Exchange with Full Forward Security and Robust Synchronization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2021, pp. 702, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
11 | Colin Boyd, Kai Gellert |
A Modern View on Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. J. ![In: Comput. J. 64(4), pp. 639-652, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
11 | Chang Xu 0004, Lan Yu, Liehuang Zhu, Can Zhang 0002 |
Blockchain-Based Verifiable DSSE with Forward Security in Multi-server Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WASA (3) ![In: Wireless Algorithms, Systems, and Applications - 16th International Conference, WASA 2021, Nanjing, China, June 25-27, 2021, Proceedings, Part III, pp. 163-171, 2021, Springer, 978-3-030-86136-0. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
11 | Colin Boyd, Gareth T. Davies, Bor de Kock, Kai Gellert, Tibor Jager, Lise Millerjord |
Symmetric Key Exchange with Full Forward Security and Robust Synchronization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (4) ![In: Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part IV, pp. 681-710, 2021, Springer, 978-3-030-92067-8. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
11 | Meenakshi Kansal, Ratna Dutta, Sourav Mukhopadhyay |
Group signature from lattices preserving forward security in dynamic setting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adv. Math. Commun. ![In: Adv. Math. Commun. 14(4), pp. 535-553, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
11 | Barbara Martini, Paolo Mori, Francesco Marino, Andrea Saracino, Alessio Lunardelli, Antonio La Marra, Fabio Martinelli, Piero Castoldi |
Pushing Forward Security in Network Slicing by Leveraging Continuous Usage Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Commun. Mag. ![In: IEEE Commun. Mag. 58(7), pp. 65-71, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
11 | Qinglong Wang, Min Ou, Yun Yang 0005, Zongtao Duan |
Conditional Privacy-Preserving Anonymous Authentication Scheme With Forward Security in Vehicle-to-Grid Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 217592-217602, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
11 | Zhicai Shi, Xiaomei Zhang, Jin Liu 0010 |
The Lightweight RFID Grouping-Proof Protocols with Identity Authentication and Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Commun. Mob. Comput. ![In: Wirel. Commun. Mob. Comput. 2020, pp. 8436917:1-8436917:12, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
11 | Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Ha Thanh Nguyen Tran, Viet Cuong Trinh, Josef Pieprzyk, Thomas Plantard |
Lattice Blind Signatures with Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2007.06884, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
11 | Suvradip Chakraborty, Harish Karthikeyan, Adam O'Neill, C. Pandu Rangan |
Forward-Security Under Continual Leakage with Deterministic Key Updates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2020, pp. 736, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
11 | Xiangyu Wang 0010, Jianfeng Ma 0001, Ximeng Liu, Yinbin Miao, Dan Zhu |
Spatial Dynamic Searchable Encryption with Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASFAA (2) ![In: Database Systems for Advanced Applications - 25th International Conference, DASFAA 2020, Jeju, South Korea, September 24-27, 2020, Proceedings, Part II, pp. 746-762, 2020, Springer, 978-3-030-59415-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
11 | Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Ha Thanh Nguyen Tran, Viet Cuong Trinh, Josef Pieprzyk, Thomas Plantard |
Lattice Blind Signatures with Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings, pp. 3-22, 2020, Springer, 978-3-030-55303-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
11 | Sébastien Canard, Adela Georgescu, Guillaume Kaim, Adeline Roux-Langlois, Jacques Traoré |
Constant-Size Lattice-Based Group Signature with Forward Security in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29 - December 1, 2020, Proceedings, pp. 24-44, 2020, Springer, 978-3-030-62575-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 166 (100 per page; Change: ) Pages: [ 1][ 2][ >>] |