Publication | Date of Publication | Type |
---|
Structured encryption for knowledge graphs | 2024-03-07 | Paper |
M-EDESE: multi-domain, easily deployable, and efficiently searchable encryption | 2023-08-04 | Paper |
Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment | 2022-12-22 | Paper |
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles | 2022-10-28 | Paper |
Server-aided revocable attribute-based encryption | 2022-08-19 | Paper |
Server-Aided Revocable Identity-Based Encryption | 2022-08-19 | Paper |
Revocable policy-based chameleon hash | 2022-06-15 | Paper |
Private Information Retrieval Using Trusted Hardware | 2022-03-09 | Paper |
Secure server-aided data sharing clique with attestation | 2021-04-19 | Paper |
Key regeneration-free ciphertext-policy attribute-based encryption and its application | 2021-03-31 | Paper |
Expressive query over outsourced encrypted data | 2020-09-08 | Paper |
CCA secure encryption supporting authorized equality test on ciphertexts in standard model and its applications | 2020-07-02 | Paper |
Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman | 2020-02-07 | Paper |
Encrypted data processing with homomorphic re-encryption | 2020-02-07 | Paper |
Escrow free attribute-based signature with self-revealability | 2020-01-06 | Paper |
Privacy-preserving remote user authentication with \(k\)-times untraceability | 2019-10-31 | Paper |
Fuzzy public-key encryption based on biometric data | 2018-11-07 | Paper |
Adaptable key-policy attribute-based encryption with time interval | 2018-04-11 | Paper |
Attribute-based encryption with expressive and authorized keyword search | 2017-08-25 | Paper |
A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains | 2017-05-16 | Paper |
An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures | 2017-01-06 | Paper |
On the security of two identity-based conditional proxy re-encryption schemes | 2016-11-04 | Paper |
Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security | 2016-09-02 | Paper |
Towards semantically secure outsourcing of association rule mining on categorical data | 2016-07-08 | Paper |
CCA-Secure Keyed-Fully Homomorphic Encryption | 2016-04-13 | Paper |
Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext | 2015-11-20 | Paper |
A note on the security of KHL scheme | 2015-09-25 | Paper |
Continuous Non-malleable Key Derivation and Its Application to Related-Key Security | 2015-08-27 | Paper |
Verifiable Computation on Outsourced Encrypted Data | 2015-07-24 | Paper |
Authorized Keyword Search on Encrypted Data | 2015-07-24 | Paper |
Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack | 2014-05-27 | Paper |
Adaptable Ciphertext-Policy Attribute-Based Encryption | 2014-02-18 | Paper |
Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks | 2014-01-20 | Paper |
Accountable Authority Identity-Based Encryption with Public Traceability | 2013-03-18 | Paper |
Dynamic Secure Cloud Storage with Provenance | 2012-06-08 | Paper |
General Construction of Chameleon All-But-One Trapdoor Functions | 2011-09-16 | Paper |
Fully Secure Cipertext-Policy Hiding CP-ABE | 2011-05-19 | Paper |
Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext Security | 2011-03-15 | Paper |
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings | 2011-01-28 | Paper |
Cryptanalysis of a certificateless signcryption scheme in the standard model | 2011-01-28 | Paper |
Achieving high security and efficiency in RFID-tagged supply chains | 2010-09-22 | Paper |
A New Framework for RFID Privacy | 2010-09-20 | Paper |
Efficient Unidirectional Proxy Re-Encryption | 2010-05-04 | Paper |
Efficient CCA-Secure PKE from Identity-Based Techniques | 2010-03-16 | Paper |
Efficient discrete logarithm based multi-signature scheme in the plain public key model | 2010-02-25 | Paper |
Validating Digital Signatures without TTP’s Time-Stamping and Certificate Revocation | 2010-02-09 | Paper |
Multiuser private queries over encrypted databases | 2009-10-12 | Paper |
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security | 2009-09-29 | Paper |
Conditional Proxy Broadcast Re-Encryption | 2009-06-25 | Paper |
Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme | 2009-03-06 | Paper |
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings | 2009-01-09 | Paper |
An Efficient PIR Construction Using Trusted Hardware | 2008-11-20 | Paper |
nPAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords | 2008-03-25 | Paper |
Applied Cryptography and Network Security | 2008-02-19 | Paper |
Routing optimization security in mobile IPv6 | 2007-03-15 | Paper |
Access control protocols with two-layer architecture for wireless networks | 2007-01-09 | Paper |
Information and Communications Security | 2006-10-24 | Paper |
Information and Communications Security | 2006-10-24 | Paper |
Information and Communications Security | 2006-10-24 | Paper |
Information Security | 2006-10-16 | Paper |
Information Security and Privacy | 2006-06-22 | Paper |
Information Security and Cryptology - ICISC 2003 | 2005-12-27 | Paper |
Information and Communications Security | 2005-08-19 | Paper |
Information and Communications Security | 2005-08-19 | Paper |
Efficient and robust key management for large mobile ad hoc networks | 2005-08-03 | Paper |
Applied Cryptography and Network Security | 2005-06-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q3154880 | 2005-01-14 | Paper |
Highly reliable trust establishment scheme in ad hoc networks | 2004-11-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q4473595 | 2004-08-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4412957 | 2003-07-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q3149731 | 2002-09-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q4501508 | 2002-07-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q2724593 | 2002-07-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q2724591 | 2002-07-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q4249261 | 2002-06-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q4249262 | 2002-04-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q2763029 | 2002-01-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q4409354 | 2002-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4950034 | 2001-08-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q2721124 | 2001-07-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q2721152 | 2001-07-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4263416 | 1999-11-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4250644 | 1999-11-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q4251006 | 1999-09-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q3840078 | 1998-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4400577 | 1997-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4857236 | 1996-06-19 | Paper |
On the equivalence of McEliece's and Niederreiter's public-key cryptosystems | 1994-10-04 | Paper |
Performance analysis of interconnected LANs with server/client configuration | 1994-02-09 | Paper |
Hybrid ARQ schemes for point-to-multipoint communication over nonstationary broadcast channels | 1994-02-07 | Paper |
Trellis-coded multidimensional phase modulation | 1990-01-01 | Paper |
DC-free coset codes | 1988-01-01 | Paper |
Decoding of DBEC-TBED Reed-Solomon Codes | 1987-01-01 | Paper |