The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ProvSec"( http://dblp.L3S.de/Venues/ProvSec )

URL (DBLP): http://dblp.uni-trier.de/db/conf/provsec

Publication years (Num. hits)
2007 (18) 2008 (26) 2009 (22) 2010 (19) 2011 (29) 2012 (22) 2013 (20) 2014 (27) 2015 (28) 2016 (24) 2017 (30) 2018 (26) 2019 (25) 2020 (21) 2021 (22) 2022 (20) 2023 (24)
Publication types (Num. hits)
inproceedings(386) proceedings(17)
Venues (Conferences, Journals, ...)
ProvSec(403)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 99 occurrences of 68 keywords

Results
Found 403 publication records. Showing 403 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1David Derler, Daniel Slamanig Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes. Search on Bibsonomy ProvSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yong Yu 0002, Yafang Zhang, Yi Mu 0001, Willy Susilo, Hongyu Liu Provably Secure Identity Based Provable Data Possession. Search on Bibsonomy ProvSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xavier Boyen, Qinyi Li Attribute-Based Encryption for Finite Automata from LWE. Search on Bibsonomy ProvSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Maciej Skorski On Provable Security of wPRF-Based Leakage-Resilient Stream Ciphers. Search on Bibsonomy ProvSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zhiwei Wang, Siu-Ming Yiu Attribute-Based Encryption Resilient to Auxiliary Input. Search on Bibsonomy ProvSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yohei Watanabe 0001, Junji Shikata Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribution Systems with Trade-Offs Between Communication and Storage. Search on Bibsonomy ProvSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Karim Dahmani, Mahjoub Langar, Riadh Robbana A Formal Dynamic Verification of Choreographed Web Services Conversations. Search on Bibsonomy ProvSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Shiuan-Tzuo Shen, Amir Rezapour, Wen-Guey Tzeng Unique Signature with Short Output from CDH Assumption. Search on Bibsonomy ProvSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay Functional Signcryption: Notion, Construction, and Applications. Search on Bibsonomy ProvSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yusuke Naito 0001 Full PRF-Secure Message Authentication Code Based on Tweakable Block Cipher. Search on Bibsonomy ProvSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Man Ho Au, Atsuko Miyaji (eds.) Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings Search on Bibsonomy ProvSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zongyang Zhang, Yu Chen 0003, Sherman S. M. Chow, Goichiro Hanaoka, Zhenfu Cao, Yunlei Zhao Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model. Search on Bibsonomy ProvSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Serge Vaudenay On Privacy for RFID. Search on Bibsonomy ProvSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Katsuyuki Takashima, Atsushi Takayasu Tighter Security for Efficient Lattice Cryptography via the Rényi Divergence of Optimized Orders. Search on Bibsonomy ProvSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Suvradip Chakraborty, Goutam Paul 0001, C. Pandu Rangan Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction. Search on Bibsonomy ProvSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards. Search on Bibsonomy ProvSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Bernardo Machado David, Rafael Dowsley, Raj S. Katti, Anderson C. A. Nascimento Efficient Unconditionally Secure Comparison and Privacy Preserving Machine Learning Classification Protocols. Search on Bibsonomy ProvSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Donghoon Chang, Sumesh Manjunath R., Somitra Kumar Sanadhya PPAE: Practical Parazoa Authenticated Encryption Family. Search on Bibsonomy ProvSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Noboru Kunihiro An Improved Attack for Recovering Noisy RSA Secret Keys and Its Countermeasure. Search on Bibsonomy ProvSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade, Tobias Nilges From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions. Search on Bibsonomy ProvSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nilanjan Datta, Mridul Nandi Equivalence between MAC, WCR and PRF for Blockcipher Based Constructions. Search on Bibsonomy ProvSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shoichi Hirose, Hidenori Kuwakado A Block-Cipher-Based Hash Function Using an MMO-Type Double-Block Compression Function. Search on Bibsonomy ProvSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Peeter Laud, Alisa Pankova Verifiable Computation in Multiparty Protocols with Honest Majority. Search on Bibsonomy ProvSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jiageng Chen, Atsuko Miyaji, Chunhua Su A Provable Secure Batch Authentication Scheme for EPCGen2 Tags. Search on Bibsonomy ProvSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kazuki Yoneyama Computational Soundness of Asymmetric Bilinear Pairing-Based Protocols. Search on Bibsonomy ProvSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Tapas Pandit, Sumit Kumar Pandey, Rana Barua Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack. Search on Bibsonomy ProvSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Guangyao Zhao, Lei Cheng, Chao Li 0002, Ruilin Li, Xuan Shen On the Practical Security Bound of GF-NLFSR Structure with SPN Round Function. Search on Bibsonomy ProvSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ahto Buldas, Risto Laanoja, Peeter Laud, Ahto Truu Bounded Pre-image Awareness and the Security of Hash-Tree Keyless Signatures. Search on Bibsonomy ProvSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Somindu C. Ramanna, Palash Sarkar 0001 Efficient (Anonymous) Compact HIBE from Standard Assumptions. Search on Bibsonomy ProvSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yohei Watanabe 0001, Junji Shikata Timed-Release Computational Secret Sharing Scheme and Its Applications. Search on Bibsonomy ProvSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Haiyang Xue, Xianhui Lu, Bao Li 0001, Yamin Liu Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation. Search on Bibsonomy ProvSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yanjiang Yang, Haibing Lu, Jian Weng 0001, Youcheng Zhang, Kouichi Sakurai Fine-Grained Conditional Proxy Re-Encryption and Application. Search on Bibsonomy ProvSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Lukasz Krzywiecki Deniable Version of SIGMA Key Exchange Protocol Resilient to Ephemeral Key Leakage. Search on Bibsonomy ProvSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kazuki Yoneyama, Goichiro Hanaoka Compact Public Key Encryption with Minimum Ideal Property of Hash Functions. Search on Bibsonomy ProvSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hui Cui 0001, Yi Mu 0001, Man Ho Au Complete Robustness in Identity-Based Encryption. Search on Bibsonomy ProvSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mehdi Tibouchi Impossibility of Surjective Icart-Like Encodings. Search on Bibsonomy ProvSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sherman S. M. Chow, Joseph K. Liu, Lucas Chi Kwong Hui, Siu-Ming Yiu (eds.) Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings Search on Bibsonomy ProvSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Reza Reyhanitabar, Serge Vaudenay, Damian Vizár Misuse-Resistant Variants of the OMD Authenticated Encryption Mode. Search on Bibsonomy ProvSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Rongxing Lu, Xiaodong Lin 0001, Jun Shao 0001, Kaitai Liang RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security. Search on Bibsonomy ProvSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yuyu Wang 0001, Keisuke Tanaka Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Leakage Resiliency. Search on Bibsonomy ProvSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Michel Abdalla Password-Based Authenticated Key Exchange: An Overview. Search on Bibsonomy ProvSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Takashi Yamakawa, Nobuaki Kitajima, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto A Short Fail-Stop Signature Scheme from Factoring. Search on Bibsonomy ProvSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shoichi Hirose, Hidenori Kuwakado Forward-Secure Sequential Aggregate Message Authentication Revisited. Search on Bibsonomy ProvSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Koji Nuida How to Use Pseudorandom Generators in Unconditional Security Settings. Search on Bibsonomy ProvSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Jesper Buus Nielsen Adaptive versus Static Security in the UC Model. Search on Bibsonomy ProvSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shuichi Katsumata, Noboru Kunihiro Constructing Subspace Membership Encryption through Inner Product Encryption. Search on Bibsonomy ProvSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yinghui Zhang 0002, Dong Zheng 0001, Xiaofeng Chen 0001, Jin Li 0002, Hui Li 0006 Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts. Search on Bibsonomy ProvSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Y. Sreenivasa Rao, Ratna Dutta Computationally Efficient Dual-Policy Attribute Based Encryption with Short Ciphertext. Search on Bibsonomy ProvSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Tsz Hon Yuen, Cong Zhang 0001, Sherman S. M. Chow, Joseph K. Liu Towards Anonymous Ciphertext Indistinguishability with Identity Leakage. Search on Bibsonomy ProvSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Angsuman Das, Sabyasachi Dutta, Avishek Adhikari Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture. Search on Bibsonomy ProvSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kazuhiko Minematsu A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes. Search on Bibsonomy ProvSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Prabhanjan Ananth, Raghav Bhaskar Non Observability in the Random Oracle Model. Search on Bibsonomy ProvSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Cristian Ene, Clémentine Gritti, Yassine Lakhnech CIL Security Proof for a Password-Based Key Exchange. Search on Bibsonomy ProvSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Dingding Jia, Xianhui Lu, Bao Li 0001, Qixiang Mei RKA Secure PKE Based on the DDH and HR Assumptions. Search on Bibsonomy ProvSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Serge Vaudenay On Modeling Terrorist Frauds - Addressing Collusion in Distance Bounding Protocols. Search on Bibsonomy ProvSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kazuhiko Minematsu, Stefan Lucks, Tetsu Iwata Improved Authenticity Bound of EAX, and Refinements. Search on Bibsonomy ProvSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hui Cui 0001, Yi Mu 0001, Man Ho Au Anonymous Signcryption against Linear Related-Key Attacks. Search on Bibsonomy ProvSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hai Huang Authenticated Key Exchange Protocols Based on Factoring Assumption. Search on Bibsonomy ProvSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Willy Susilo, Reza Reyhanitabar (eds.) Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings Search on Bibsonomy ProvSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xianhui Lu, Bao Li 0001, Yamin Liu How to Remove the Exponent GCD in HK09. Search on Bibsonomy ProvSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kazumaro Aoki, Kan Yasuda The Security of the OCB Mode of Operation without the SPRP Assumption. Search on Bibsonomy ProvSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nirattaya Khamsemanan, William E. Skeith III Translation-Randomizable Distributions via Random Walks. Search on Bibsonomy ProvSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Toshiyuki Isshiki, Manh Ha Nguyen, Keisuke Tanaka Factoring-Based Proxy Re-Encryption Schemes. Search on Bibsonomy ProvSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ioana Boureanu, Serge Vaudenay Input-Aware Equivocable Commitments and UC-secure Commitments with Atomic Exchanges. Search on Bibsonomy ProvSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1S. Sree Vivek, S. Sharmila Deva Selvi, Layamrudhaa Renganathan Venkatesan, C. Pandu Rangan Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round. Search on Bibsonomy ProvSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Weiwei Liu 0005, Guomin Yang, Yi Mu 0001, Jiannan Wei k-time Proxy Signature: Formal Definition and Efficient Construction. Search on Bibsonomy ProvSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hui Guo, Zhenfeng Zhang, Jiang Zhang 0001, Cheng Chen Towards a Secure Certificateless Proxy Re-Encryption Scheme. Search on Bibsonomy ProvSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Zheng Yang 0005, Jörg Schwenk Strongly Authenticated Key Exchange Protocol from Bilinear Groups without Random Oracles. Search on Bibsonomy ProvSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yu Chen 0003, Zongyang Zhang, Dongdai Lin, Zhenfu Cao Anonymous Identity-Based Hash Proof System and Its Applications. Search on Bibsonomy ProvSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Oana Ciobotaru On the (Non-)Equivalence of UC Security Notions. Search on Bibsonomy ProvSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yunmei Zhang, Joseph K. Liu, Xinyi Huang 0001, Man Ho Au, Willy Susilo Efficient Escrow-Free Identity-Based Signature. Search on Bibsonomy ProvSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Cheng Chen, Zhenfeng Zhang, Dengguo Feng Fully Secure Doubly-Spatial Encryption under Simple Assumptions. Search on Bibsonomy ProvSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Margus Niitsoo Deterministic Random Oracles. Search on Bibsonomy ProvSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Masayuki Yoshino, Noboru Kunihiro, Ken Naganuma, Hisayoshi Sato Symmetric Inner-Product Predicate Encryption Based on Three Groups. Search on Bibsonomy ProvSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Bo Yang 0003, Mingwu Zhang LR-UESDE: A Continual-Leakage Resilient Encryption with Unbounded Extensible Set Delegation. Search on Bibsonomy ProvSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Xingwen Zhao, Hui Li 0006 Codes Based Tracing and Revoking Scheme with Constant Ciphertext. Search on Bibsonomy ProvSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1ZhaoHui Tang, Hoon Wei Lim, Huaxiong Wang Revisiting a Secret Sharing Approach to Network Codes. Search on Bibsonomy ProvSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Shengke Zeng, Zhiguang Qin, Qing Lu, Qinyi Li Efficient and Random Oracle-Free Conditionally Anonymous Ring Signature. Search on Bibsonomy ProvSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mototsugu Nishioka Perfect Keyword Privacy in PEKS Systems. Search on Bibsonomy ProvSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Masayuki Abe Tools over Bilinear Groups for Modular Design of Cryptographic Tasks. Search on Bibsonomy ProvSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ioana Boureanu, Serge Vaudenay Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices. Search on Bibsonomy ProvSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Tsuyoshi Takagi, Guilin Wang, Zhiguang Qin, Shaoquan Jiang, Yong Yu 0002 (eds.) Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings Search on Bibsonomy ProvSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Cheng Chen, Jie Chen 0021, Hoon Wei Lim, Zhenfeng Zhang, Dengguo Feng Combined Public-Key Schemes: The Case of ABE and ABS. Search on Bibsonomy ProvSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Dennis Y. W. Liu, Duncan S. Wong One-Move Convertible Nominative Signature in the Standard Model. Search on Bibsonomy ProvSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Tapas Pandit, Rana Barua Efficient Fully Secure Attribute-Based Encryption Schemes for General Access Structures. Search on Bibsonomy ProvSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Takanori Suga, Takashi Nishide, Kouichi Sakurai Secure Keyword Search Using Bloom Filter with Specified Character Positions. Search on Bibsonomy ProvSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Reza Reyhanitabar, Willy Susilo On Capabilities of Hash Domain Extenders to Preserve Enhanced Security Properties. Search on Bibsonomy ProvSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yanfei Guo, Zhenfeng Zhang Authenticated Key Exchange with Entities from Different Settings and Varied Groups. Search on Bibsonomy ProvSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1S. Sharmila Deva Selvi, S. Sree Vivek, Dhinakaran Vinayagamurthy, C. Pandu Rangan ID Based Signcryption Scheme in Standard Model. Search on Bibsonomy ProvSec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Keisuke Tanaka, Akihiro Yamada, Kenji Yasunaga Weak Oblivious Transfer from Strong One-Way Functions. Search on Bibsonomy ProvSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Xavier Boyen, Xiaofeng Chen 0001 (eds.) Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings Search on Bibsonomy ProvSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Bingsheng Zhang Simulatable Adaptive Oblivious Transfer with Statistical Receiver's Privacy. Search on Bibsonomy ProvSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Duong Hieu Phan, Viet Cuong Trinh Identity-Based Trace and Revoke Schemes. Search on Bibsonomy ProvSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Rong Cheng, Bo Zhang 0072, Fangguo Zhang Secure Obfuscation of Encrypted Verifiable Encrypted Signatures. Search on Bibsonomy ProvSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Hitoshi Namiki, Keisuke Tanaka, Kenji Yasunaga Randomness Leakage in the KEM/DEM Framework. Search on Bibsonomy ProvSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Fagen Li, Fahad Bin Muhaya, Mingwu Zhang, Tsuyoshi Takagi Efficient Identity-Based Signcryption in the Standard Model. Search on Bibsonomy ProvSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Tsz Hon Yuen, Duncan S. Wong, Willy Susilo, Qiong Huang 0001 Concurrent Signatures with Fully Negotiable Binding Control. Search on Bibsonomy ProvSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yusuke Naito 0001, Kazuki Yoneyama, Lei Wang 0031, Kazuo Ohta Security of Practical Cryptosystems Using Merkle-Damgård Hash Function in the Ideal Cipher Model. Search on Bibsonomy ProvSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Vipul Goyal Secure Composition of Cryptographic Protocols. Search on Bibsonomy ProvSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Bingsheng Zhang Generic Constant-Round Oblivious Sorting Algorithm for MPC. Search on Bibsonomy ProvSec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 403 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license