Results
Found 55 publication records. Showing 55 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
83 | Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai |
Orthogonality between Key Privacy and Data Privacy, Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers, pp. 313-327, 2007, Springer, 978-3-540-79498-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Shigenori Yamakawa, Yang Cui 0001, Kazukuni Kobara, Manabu Hagiwara, Hideki Imai |
On the Key-Privacy Issue of McEliece Public-Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAECC ![In: Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 17th International Symposium, AAECC-17, Bangalore, India, December 16-20, 2007, Proceedings, pp. 168-177, 2007, Springer, 978-3-540-77223-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Agusti Solanas, Antoni Martínez-Ballesté |
Privacy Protection in Location-Based Services Through a Public-Key Privacy Homomorphism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 362-368, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
public-key privacy homomorphism, location privacy |
43 | Kenneth G. Paterson, Sriramkrishnan Srinivasan |
Building Key-Private Public-Key Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings, pp. 276-292, 2009, Springer, 978-3-642-02619-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
multiple trusted authorities, TA anonymity, standard model, public-key encryption, identity-based encryption, key-privacy |
30 | E. Michael Power |
Developing a Culture of Privacy: A Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 5(6), pp. 58-60, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Raphael C.-W. Phan, Bok-Min Goi |
Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings, pp. 226-238, 2006, 3-540-34703-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
n-party, cryptanalysis, dictionary attack, collusion, Password-authenticated key exchange, key privacy |
28 | Ryotaro Hayashi 0001, Keisuke Tanaka |
Universally Anonymizable Public-Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings, pp. 293-312, 2005, Springer, 3-540-30684-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Cramer- Shoup, RSA-OAEP, anonymity, encryption, ElGamal, key-privacy |
26 | Ryotaro Hayashi 0001, Tatsuaki Okamoto, Keisuke Tanaka |
An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004, pp. 291-304, 2004, Springer, 3-540-21018-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Chung Ki Li, Guomin Yang, Duncan S. Wong, Xiaotie Deng, Sherman S. M. Chow |
An Efficient Signcryption Scheme with Key Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 78-93, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Ciphertext Anonymity, Gap Diffie-Hellman, Signcryption, Key Privacy |
23 | Mihir Bellare, Alexandra Boldyreva, Anand Desai, David Pointcheval |
Key-Privacy in Public-Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings, pp. 566-582, 2001, Springer, 3-540-42987-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
22 | Cynthia Dwork |
Differential Privacy: A Survey of Results. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TAMC ![In: Theory and Applications of Models of Computation, 5th International Conference, TAMC 2008, Xi'an, China, April 25-29, 2008. Proceedings, pp. 1-19, 2008, Springer, 978-3-540-79227-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Guomin Yang, Duncan S. Wong, Xiaotie Deng |
Analysis and Improvement of a Signcryption Scheme with Key Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings, pp. 218-232, 2005, Springer, 3-540-29001-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Ashutosh Saxena |
Threshold SKI Protocol for ID-based Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 65-70, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
secure key issuing, ID-based cryptography |
18 | Dickson K. W. Chiu, Patrick C. K. Hung |
Privacy and Access Control Issues in Financial Enterprise Content Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Arif Tumer, Asuman Dogac, Ismail Hakki Toroslu |
A Semantic-Based User Privacy Protection Framework for Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITWP ![In: Intelligent Techniques for Web Personalization, IJCAI 2003 Workshop, ITWP 2003, Acapulco, Mexico, August 11, 2003, Revised Selected Papers, pp. 289-305, 2003, Springer, 3-540-29846-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Liang Ni 0001, Hengsheng Zhou, Yawei Zhang, Xiaoyan Liu, Bingke Gu |
Provably Secure Symmetric-Key Privacy-Preserving authenticated key agreement protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCNS ![In: Proceedings of the 2023 13th International Conference on Communication and Network Security, ICCNS 2023, Fuzhou, China, December 6-8, 2023, pp. 117-126, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Qiang Wang 0020, Xue Qiu, Quan Zhang, Chaojing Tang |
Key Privacy in McEliece Public Key Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011, pp. 824-828, 2011, IEEE Computer Society, 978-1-4577-2135-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
16 | Ya-Fen Chang, Jhih-Yi Lin, Yuo-Ju Yen |
Comments on a Secret-Key-Privacy-Preserving Authentication and Key Agreement Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICGEC ![In: Fifth International Conference on Genetic and Evolutionary Computing, ICGEC 2011, Kinmen, Taiwan / Xiamen, China, August 29 - September 1, 2011, pp. 168-171, 2011, IEEE Computer Society, 978-1-4577-0817-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
16 | Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano |
Private-Key Hidden Vector Encryption with Key Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTCS ![In: Theoretical Computer Science, 11th Italian Conference, ICTCS 2009, Cremona, Italy, September 28-30, 2009, Proceedings., pp. 46-50, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
15 | Rui Zhang 0002 |
Acquiring Key Privacy from Data Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers, pp. 359-372, 2010, Springer, 978-3-642-21517-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Giuseppe Ateniese, Karyn Benson, Susan Hohenberger |
Key-Private Proxy Re-encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings, pp. 279-294, 2009, Springer, 978-3-642-00861-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Byoungcheon Lee |
Unified Public Key Infrastructure Supporting Both Certificate-Based and ID-Based Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: ARES 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland, pp. 54-61, 2010, IEEE Computer Society, 978-0-7695-3965-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Unified public key infrastructure, Private key issuing protocol, Key generation and certification authority, Key privacy agent, Certificate-based cryptography, Hybrid cryptography, Bilinear pairing, ID-based cryptography |
14 | Davide Alessio, Marc Joye |
A simple construction for public-key encryption with revocable anonymity: the honest-sender case. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the 9th ACM Workshop on Digital Rights Management, Chicago, Illinois, USA, November 9, 2009, pp. 11-16, 2009, ACM, 978-1-60558-779-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anonymity, public-key encryption, key-privacy |
14 | Qianhong Wu, Bo Qin, Yi Mu 0001, Willy Susilo |
Privacy for Private Key in Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers, pp. 84-95, 2008, Springer, 978-3-642-01439-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Anonymous identity, Key indistinguishability, Key leakage, Pairing groups, Key privacy, Chosen message attack |
14 | Ryotaro Hayashi 0001, Keisuke Tanaka |
Anonymity on Paillier's Trap-Door Permutation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, pp. 200-214, 2007, Springer, 978-3-540-73457-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Paillier’s function, Paillier’s trap-door permutation, anonymity, encryption, key-privacy |
14 | Anand Desai |
The Security of All-or-Nothing Encryption: Protecting against Exhaustive Key Search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings, pp. 359-375, 2000, Springer, 3-540-67907-3. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
12 | Hua Guo, Yi Mu 0001, Xiyong Zhang, Zhoujun Li 0001 |
Server-Controlled Identity-Based Authenticated Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings, pp. 214-229, 2009, Springer, 978-3-642-04641-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Provable Security, Key Exchange, Identity-based Cryptography |
12 | Michel Abdalla, Olivier Chevassut, Pierre-Alain Fouque, David Pointcheval |
A Simple Threshold Authenticated Key Exchange from Short Secrets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings, pp. 566-584, 2005, Springer, 3-540-30684-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Threshold Protocols, Password-based Authentication |
11 | Aggelos Kiayias, Yiannis Tsiounis, Moti Yung |
Group Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings, pp. 181-199, 2007, Springer, 978-3-540-76899-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Jinnan Zhang, Zheng Wei, Yang Liu 0003, Qinghua Gong, Xinmin Wang, Min Qiao |
Verifiable Multi-Key Privacy Data Computing System Based on Blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAIT ![In: 15th IEEE International Conference on Advanced Infocomm Technology, ICAIT 2023, Hefei, China, October 13-16, 2023, pp. 295-300, 2023, IEEE, 979-8-3503-1412-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
10 | Yang Wang, Yanmin Zhao, Mingqiang Wang |
PREs with HRA Security and Key Privacy Based on Standard LWE Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2021, pp. 1424, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
10 | Emmanuel Antwi-Boasiako, Shijie Zhou, Yongjian Liao, Ebenezer Kwaku Danso |
An LWE-Based Multi-Key Privacy-Preserving Distributed Deep Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCC/DSS/SmartCity/DependSys ![In: 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys), Haikou, Hainan, China, December 20-22, 2021, pp. 533-542, 2021, IEEE, 978-1-6654-9457-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
10 | Ping Li 0018, Jin Li 0002, Zhengan Huang, Tong Li 0011, Chong-Zhi Gao, Siu-Ming Yiu, Kai Chen 0012 |
Multi-key privacy-preserving deep learning in cloud computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Gener. Comput. Syst. ![In: Future Gener. Comput. Syst. 74, pp. 76-85, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
10 | Yusuke Yoshida, Kirill Morozov, Keisuke Tanaka |
CCA2 Key-Privacy for Code-Based Encryption in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PQCrypto ![In: Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings, pp. 35-50, 2017, Springer, 978-3-319-59878-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
10 | Danilo Gligoroski, Simona Samardjiska |
Semantic Security and Key-Privacy With Random Split of St-Gen Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 218, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
10 | Le Trieu Phong, Lihua Wang 0001, Yoshinori Aono, Manh Ha Nguyen, Xavier Boyen |
Proxy Re-Encryption Schemes with Key Privacy from LWE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 327, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
10 | Stefan Rass, Raphael Wigoutschnigg |
Arguable anonymity from key-privacy: The deterministic crowds protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: 2016 IEEE/IFIP Network Operations and Management Symposium, NOMS 2016, Istanbul, Turkey, April 25-29, 2016, pp. 571-576, 2016, IEEE, 978-1-5090-0223-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
10 | Danilo Gligoroski, Simona Samardjiska |
Semantic Security and Key-Privacy with Random Split of St-Gen Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CiE ![In: Pursuit of the Universal - 12th Conference on Computability in Europe, CiE 2016, Paris, France, June 27 - July 1, 2016, Proceedings, pp. 105-114, 2016, Springer, 978-3-319-40188-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
10 | Faezeh Sadat Babamir, Ali Norouzi |
Achieving Key Privacy and Invisibility for Unattended Wireless Sensor Networks in Healthcare. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. J. ![In: Comput. J. 57(4), pp. 624-635, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
10 | Paolo D'Arco, Alfredo De Santis |
Key privacy and anonymous protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Eleventh Annual International Conference on Privacy, Security and Trust, PST 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain, July 10-12, 2013, pp. 11-18, 2013, IEEE Computer Society, 978-1-4673-5839-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
10 | Jun Shao 0001, Peng Liu 0005, Yuan Zhou |
Achieving key privacy without losing CCA security in proxy re-encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Softw. ![In: J. Syst. Softw. 85(3), pp. 655-665, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
10 | Qiong Huang 0001, Duncan S. Wong, Guomin Yang |
Heterogeneous Signcryption with Key Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. J. ![In: Comput. J. 54(4), pp. 525-536, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
10 | Chung Ki Li, Guomin Yang, Duncan S. Wong, Xiaotie Deng, Sherman S. M. Chow |
An efficient signcryption scheme with key privacy and its extension to ring signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Secur. ![In: J. Comput. Secur. 18(3), pp. 451-473, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
10 | Chik How Tan |
Analysis of improved signcryption scheme with key privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Process. Lett. ![In: Inf. Process. Lett. 99(4), pp. 135-138, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Jason E. Holt |
Key Privacy for Identity Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2006, pp. 120, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
10 | Chik How Tan |
On the Security of Signcryption Scheme with Key Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(4), pp. 1093-1095, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Shai Halevi |
A sufficient condition for key-privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2005, pp. 5, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
10 | Benoît Libert, Jean-Jacques Quisquater |
Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004, pp. 187-200, 2004, Springer, 3-540-21018-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Gap Diffie-Hellman groups, provable security, signcryption |
10 | John M. Carroll 0002, P. M. McLelland |
Fast "infinite-key" privacy transformation for resource-sharing systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFIPS Fall Joint Computing Conference ![In: American Federation of Information Processing Societies: Proceedings of the AFIPS '70 Fall Joint Computer Conference, November 17-19, 1970, Houston, Texas, USA, pp. 223-230, 1970, AFIPS / ACM, 978-1-4503-7904-5. The full citation details ...](Pics/full.jpeg) |
1970 |
DBLP DOI BibTeX RDF |
|
10 | Michel Abdalla, Malika Izabachène, David Pointcheval |
Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings, pp. 133-148, 2008, Springer, 978-3-540-89640-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Dalia Khader |
Public Key Encryption with Keyword Search Based on K-Resilient IBE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings. Part III, pp. 1086-1095, 2007, Springer, 978-3-540-74482-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Dalia Khader |
Public Key Encryption with Keyword Search Based on K-Resilient IBE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III, pp. 298-308, 2006, Springer, 3-540-34075-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
7 | Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang |
A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, pp. 459-475, 2006, Springer, 3-540-38341-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
6 | Laila El Aimani |
Anonymity from Public Key Encryption to Undeniable Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings, pp. 217-234, 2009, Springer, 978-3-642-02383-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Encryption schemes, KEM/DEM, Convertible undeniable signatures, Anonymity, Generic construction |
6 | Manoj Prabhakaran 0001, Mike Rosulek |
Rerandomizable RCCA Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings, pp. 517-534, 2007, Springer, 978-3-540-74142-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #55 of 55 (100 per page; Change: )
|