Publication | Date of Publication | Type |
---|
Server-aided revocable attribute-based encryption resilient to decryption key exposure | 2023-08-02 | Paper |
Improved security model for public-key authenticated encryption with keyword search | 2023-04-13 | Paper |
Forward-secure revocable identity-based encryption | 2022-06-08 | Paper |
Public-key authenticated encryption with keyword search revisited: security model and constructions | 2021-03-31 | Paper |
(Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance | 2020-12-10 | Paper |
Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity | 2019-12-10 | Paper |
Efficient and secure big data storage system with leakage resilience in cloud computing | 2018-11-27 | Paper |
On the polynomial basis of \(\mathrm{GF}(2^n)\) having a small number of trace-one elements | 2018-10-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q4566362 | 2018-06-14 | Paper |
Arbitrated quantum signature of quantum messages with a semi-honest arbitrator | 2018-06-13 | Paper |
RST Invariant Image Watermarking Algorithm With Mathematical Modeling and Analysis of the Watermarking Processes | 2017-10-09 | Paper |
Distributed Opportunistic Scheduling for Ad Hoc Networks With Random Access: An Optimal Stopping Approach | 2017-08-08 | Paper |
Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures | 2016-08-31 | Paper |
Fuzzy search over encrypted data supporting word frequencies and user preferences in cloud storage | 2016-08-10 | Paper |
Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts | 2015-09-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q5498094 | 2015-02-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q5499443 | 2015-02-11 | Paper |
Efficient democratic group signatures with threshold traceability | 2014-09-02 | Paper |
On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs | 2011-05-19 | Paper |
Some remarks on the TKIP key mixing function of IEEE 802.11i | 2011-01-05 | Paper |
Human visual system based adaptive digital image watermarking | 2010-05-19 | Paper |
Democratic group signatures with collective traceability | 2009-10-15 | Paper |
Filling the gap between voters and cryptography in e-voting | 2009-06-30 | Paper |
RST invariant digital image watermarking based on a new phase-only filtering method | 2009-05-18 | Paper |
The Impact of Stochastic Noisy Feedback on Distributed Network Utility Maximization | 2009-02-24 | Paper |
A Tamper-Evident Voting Machine Resistant to Covert Channels | 2009-01-27 | Paper |
Identity-Based Threshold Key-Insulated Encryption without Random Oracles | 2008-04-24 | Paper |
Ising spin-based error correcting private-key cryptosystems | 2006-11-15 | Paper |
Analysis of information leakage in quantum key agreement | 2006-11-15 | Paper |
How to play E-lottery games via voting | 2006-11-15 | Paper |
Information Security | 2006-10-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q5700989 | 2005-11-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q5700998 | 2005-11-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q5700999 | 2005-11-02 | Paper |
Multiparty authentication services and key agreement protocols with semi-trusted third party. | 2004-07-01 | Paper |
High performance sparse static solver in finite element analyses with loop-unrolling. | 2003-08-13 | Paper |