| Publication | Date of Publication | Type |
|---|
| Structured encryption for knowledge graphs | 2024-03-07 | Paper |
| M-EDESE: multi-domain, easily deployable, and efficiently searchable encryption | 2023-08-04 | Paper |
| Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment | 2022-12-22 | Paper |
| CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles | 2022-10-28 | Paper |
| Server-aided revocable attribute-based encryption | 2022-08-19 | Paper |
| Server-Aided Revocable Identity-Based Encryption | 2022-08-19 | Paper |
| Revocable policy-based chameleon hash | 2022-06-15 | Paper |
| Private Information Retrieval Using Trusted Hardware | 2022-03-09 | Paper |
| Secure server-aided data sharing clique with attestation | 2021-04-19 | Paper |
| Key regeneration-free ciphertext-policy attribute-based encryption and its application | 2021-03-31 | Paper |
| Expressive query over outsourced encrypted data | 2020-09-08 | Paper |
| CCA secure encryption supporting authorized equality test on ciphertexts in standard model and its applications | 2020-07-02 | Paper |
| Encrypted data processing with homomorphic re-encryption | 2020-02-07 | Paper |
| Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman | 2020-02-07 | Paper |
| Escrow free attribute-based signature with self-revealability | 2020-01-06 | Paper |
| Privacy-preserving remote user authentication with \(k\)-times untraceability | 2019-10-31 | Paper |
| Fuzzy public-key encryption based on biometric data | 2018-11-07 | Paper |
| Adaptable key-policy attribute-based encryption with time interval | 2018-04-11 | Paper |
| Attribute-based encryption with expressive and authorized keyword search | 2017-08-25 | Paper |
| A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains | 2017-05-16 | Paper |
| An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures | 2017-01-06 | Paper |
| On the security of two identity-based conditional proxy re-encryption schemes | 2016-11-04 | Paper |
| Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security | 2016-09-02 | Paper |
| Towards semantically secure outsourcing of association rule mining on categorical data | 2016-07-08 | Paper |
| CCA-Secure Keyed-Fully Homomorphic Encryption | 2016-04-13 | Paper |
| Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext | 2015-11-20 | Paper |
| A note on the security of KHL scheme | 2015-09-25 | Paper |
| Continuous Non-malleable Key Derivation and Its Application to Related-Key Security | 2015-08-27 | Paper |
| Verifiable Computation on Outsourced Encrypted Data | 2015-07-24 | Paper |
| Authorized Keyword Search on Encrypted Data | 2015-07-24 | Paper |
| Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack | 2014-05-27 | Paper |
| Adaptable Ciphertext-Policy Attribute-Based Encryption | 2014-02-18 | Paper |
| Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks | 2014-01-20 | Paper |
| Accountable Authority Identity-Based Encryption with Public Traceability | 2013-03-18 | Paper |
| Dynamic Secure Cloud Storage with Provenance | 2012-06-08 | Paper |
| General Construction of Chameleon All-But-One Trapdoor Functions | 2011-09-16 | Paper |
| Fully Secure Cipertext-Policy Hiding CP-ABE | 2011-05-19 | Paper |
| Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext Security | 2011-03-15 | Paper |
| Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings | 2011-01-28 | Paper |
| Cryptanalysis of a certificateless signcryption scheme in the standard model | 2011-01-28 | Paper |
| Achieving high security and efficiency in RFID-tagged supply chains | 2010-09-22 | Paper |
| A New Framework for RFID Privacy | 2010-09-20 | Paper |
| Efficient Unidirectional Proxy Re-Encryption | 2010-05-04 | Paper |
| Efficient CCA-Secure PKE from Identity-Based Techniques | 2010-03-16 | Paper |
| Efficient discrete logarithm based multi-signature scheme in the plain public key model | 2010-02-25 | Paper |
| Validating Digital Signatures without TTP’s Time-Stamping and Certificate Revocation | 2010-02-09 | Paper |
| Multiuser private queries over encrypted databases | 2009-10-12 | Paper |
| Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security | 2009-09-29 | Paper |
| Conditional Proxy Broadcast Re-Encryption | 2009-06-25 | Paper |
| Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme | 2009-03-06 | Paper |
| Chosen-Ciphertext Secure Proxy Re-encryption without Pairings | 2009-01-09 | Paper |
| An Efficient PIR Construction Using Trusted Hardware | 2008-11-20 | Paper |
| nPAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords | 2008-03-25 | Paper |
| Applied Cryptography and Network Security | 2008-02-19 | Paper |
| Routing optimization security in mobile IPv6 | 2007-03-15 | Paper |
| Access control protocols with two-layer architecture for wireless networks | 2007-01-09 | Paper |
| Information and Communications Security | 2006-10-24 | Paper |
| Information and Communications Security | 2006-10-24 | Paper |
| Information and Communications Security | 2006-10-24 | Paper |
| Information Security | 2006-10-16 | Paper |
| Information Security and Privacy | 2006-06-22 | Paper |
| Information Security and Cryptology - ICISC 2003 | 2005-12-27 | Paper |
| Information and Communications Security | 2005-08-19 | Paper |
| Information and Communications Security | 2005-08-19 | Paper |
| Efficient and robust key management for large mobile ad hoc networks | 2005-08-03 | Paper |
| Applied Cryptography and Network Security | 2005-06-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3154880 | 2005-01-14 | Paper |
| Highly reliable trust establishment scheme in ad hoc networks | 2004-11-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4473595 | 2004-08-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4412957 | 2003-07-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3149731 | 2002-09-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4501508 | 2002-07-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2724593 | 2002-07-22 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2724591 | 2002-07-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4249261 | 2002-06-23 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4249262 | 2002-04-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2763029 | 2002-01-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4409354 | 2002-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4950034 | 2001-08-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2721124 | 2001-07-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2721152 | 2001-07-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4263416 | 1999-11-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4250644 | 1999-11-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4251006 | 1999-09-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3840078 | 1998-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4400577 | 1997-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4857236 | 1996-06-19 | Paper |
| On the equivalence of McEliece's and Niederreiter's public-key cryptosystems | 1994-10-04 | Paper |
| Performance analysis of interconnected LANs with server/client configuration | 1994-02-09 | Paper |
| Hybrid ARQ schemes for point-to-multipoint communication over nonstationary broadcast channels | 1994-02-07 | Paper |
| Trellis-coded multidimensional phase modulation | 1990-01-01 | Paper |
| DC-free coset codes | 1988-01-01 | Paper |
| Decoding of DBEC-TBED Reed-Solomon Codes | 1987-01-01 | Paper |