Publication | Date of Publication | Type |
---|
Towards secure asynchronous messaging with forward secrecy and mutual authentication | 2024-05-02 | Paper |
Certainty Equivalence Control of Discrete-Time Multiagent Systems: A Framework for Uniform Global Exponential Stability | 2024-02-29 | Paper |
Synchronization of heterogeneous harmonic oscillators for generalized uniformly jointly connected networks | 2024-02-13 | Paper |
Distributed dual objective control of an energy storage system under jointly connected switching networks | 2023-06-26 | Paper |
Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy | 2023-05-26 | Paper |
Multistability analysis of quaternion-valued neural networks with cosine activation functions | 2023-04-21 | Paper |
Forward-Secure Group Encryptions from Lattices | 2023-04-13 | Paper |
Additive properties for the pseudo core inverse of morphisms in an additive category | 2023-01-02 | Paper |
New Practical Public-Key Deniable Encryption | 2022-12-21 | Paper |
Attribute based broadcast encryption with short ciphertext and decryption key | 2022-08-19 | Paper |
The pseudo core inverses of differences and products of projections in rings with involution | 2022-06-29 | Paper |
On the weighted pseudo Drazin invertible elements in associative rings and Banach algebras | 2022-06-07 | Paper |
Rank equalities related to a class of outer generalized inverse | 2022-06-03 | Paper |
Robust stability analysis of impulsive quaternion-valued neural networks with distributed delays and parameter uncertainties | 2022-03-07 | Paper |
Effects of parallel importation and power structures on price competition in duopolistic supply chains | 2022-01-24 | Paper |
Location-price game in a dual-circle market with different demand levels | 2022-01-24 | Paper |
Exclusivity or competitor retail? Impacts of channel structures on multinational supply chains considering green manufacturing | 2022-01-21 | Paper |
Robust asymptotical stability and stabilization of fractional-order complex-valued neural networks with delay | 2022-01-11 | Paper |
Two-player location-price game in a spoke market with linear transportation cost | 2022-01-11 | Paper |
An Efficient Contact Search Algorithm for Three-Dimensional Sphere Discontinuous Deformation Analysis | 2021-12-16 | Paper |
Global exponential synchronization via nonlinear feedback control for delayed inertial memristor-based quaternion-valued neural networks with impulses | 2021-11-10 | Paper |
Generalized WG inverse | 2021-11-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q3381115 | 2021-09-29 | Paper |
Right core inverses of a product and a companion matrix | 2021-09-13 | Paper |
The \((b, c)\)-inverse in semigroups and rings with involution | 2021-06-24 | Paper |
Optimal preventive ``maintenance-first or -last policies with generalized imperfect maintenance models | 2021-06-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q4984618 | 2021-04-26 | Paper |
Global Analysis of an Asymmetric Continuous Piecewise Linear Differential System with Three Linear Zones | 2021-03-12 | Paper |
Two-player location game in a closed-loop market with quantity competition | 2020-10-21 | Paper |
New publicly verifiable computation for batch matrix multiplication | 2020-10-07 | Paper |
Privacy preserving multi-party computation delegation for deep learning in cloud computing | 2020-09-09 | Paper |
Global Dynamics of a Planar Filippov System with Symmetry | 2020-08-18 | Paper |
Robust stability analysis of quaternion-valued neural networks with time delays and parameter uncertainties | 2020-05-18 | Paper |
Complete bifurcation diagram and global phase portraits of Liénard differential equations of degree four | 2020-03-09 | Paper |
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing | 2020-02-06 | Paper |
https://portal.mardi4nfdi.de/entity/Q5193716 | 2019-09-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q5194120 | 2019-09-20 | Paper |
Parameter-range-dependent robust stability conditions for quaternion-valued neural networks with time delays | 2019-05-20 | Paper |
Multistability of complex-valued neural networks with time-varying delays | 2019-03-27 | Paper |
Global \(\mu\)-stability of complex-valued neural networks with unbounded time-varying delays | 2019-02-14 | Paper |
Global \(\mu\)-stability of impulsive complex-valued neural networks with leakage delay and mixed delays | 2019-02-14 | Paper |
Robust stability analysis of quaternion-valued neural networks via LMI approach | 2019-01-21 | Paper |
Robust stability analysis of impulsive complex-valued neural networks with mixed time delays and parameter uncertainties | 2019-01-17 | Paper |
Secure publicly verifiable computation with polynomial commitment in cloud computing | 2018-09-26 | Paper |
Efficient request-based comparable encryption scheme based on sliding window method | 2017-09-08 | Paper |
Stability analysis of nonlinear fractional-order systems with variable-time impulses | 2017-06-07 | Paper |
Identity-Based Encryption with Outsourced Revocation in Cloud Computing | 2017-05-16 | Paper |
Verifiable Computation over Large Database with Incremental Updates | 2017-05-16 | Paper |
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation | 2017-05-16 | Paper |
Secure Distributed Deduplication Systems with Improved Reliability | 2017-05-16 | Paper |
Towards Efficient Fully Randomized Message-Locked Encryption | 2016-08-31 | Paper |
Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures | 2016-08-31 | Paper |
An efficient CCA-secure cryptosystem over ideal lattices from identity-based encryption | 2016-07-06 | Paper |
Essential sign change numbers of full sign pattern matrices | 2016-07-04 | Paper |
N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks | 2016-05-06 | Paper |
Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach | 2016-01-27 | Paper |
Identity-based chameleon hashing and signatures without key exposure | 2016-01-14 | Paper |
Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts | 2015-09-29 | Paper |
Secure deduplication storage systems supporting keyword search | 2015-08-31 | Paper |
Verifiable Computation over Large Database with Incremental Updates | 2015-07-24 | Paper |
Efficient algorithms for secure outsourcing of bilinear pairings | 2014-12-02 | Paper |
A New Signature Scheme Without Random Oracles from Bilinear Pairings | 2014-08-21 | Paper |
A Secure Three-Party Computational Protocol for Triangle Area | 2014-07-24 | Paper |
TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage | 2014-07-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q5166153 | 2014-06-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q2858476 | 2013-11-19 | Paper |
New Algorithms for Secure Outsourcing of Modular Exponentiations | 2013-10-23 | Paper |
Discrete logarithm based chameleon hashing and signatures without key exposure | 2013-05-31 | Paper |
Non-interactive Deniable Authentication Protocols | 2013-01-07 | Paper |
Non-delegatable Strong Designated Verifier Signature on Elliptic Curves | 2012-11-01 | Paper |
Generic security-amplifying methods of ordinary digital signatures | 2012-10-17 | Paper |
A Short Non-delegatable Strong Designated Verifier Signature | 2012-09-07 | Paper |
Global exponential stability of antiperiodic solutions for discrete-time neural networks with mixed delays and impulses | 2012-08-14 | Paper |
Identity-based trapdoor mercurial commitments and applications | 2011-10-10 | Paper |
Comments and Improvements on Key-Exposure Free Chameleon Hashing Based on Factoring | 2011-07-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q3016683 | 2011-07-19 | Paper |
New receipt-free voting scheme using double-trapdoor commitment | 2011-06-17 | Paper |
Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05 | 2010-08-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q3570991 | 2010-07-08 | Paper |
Attack on an ID-based authenticated group key agreement scheme from PKC 2004 | 2009-07-21 | Paper |
The ring authenticated encryption scheme-how to provide a clue wisely | 2009-03-24 | Paper |
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure | 2009-03-10 | Paper |
A Tamper-Evident Voting Machine Resistant to Covert Channels | 2009-01-27 | Paper |
Efficient generic on-line/off-line (threshold) signatures without key exposure | 2008-11-20 | Paper |
Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings | 2008-09-09 | Paper |
Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature | 2008-06-10 | Paper |
Generalization of functional equation for the square root spiral | 2007-01-11 | Paper |
Information Security | 2006-10-16 | Paper |
Information Security | 2006-10-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q5718410 | 2006-01-16 | Paper |
Information Security and Cryptology - ICISC 2003 | 2005-12-27 | Paper |
Progress in Cryptology - INDOCRYPT 2004 | 2005-12-22 | Paper |
Information Security Practice and Experience | 2005-09-13 | Paper |
Applied Cryptography and Network Security | 2005-06-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q4654453 | 2005-03-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4825258 | 2004-10-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q4795667 | 2003-10-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q4708747 | 2003-06-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q2706880 | 2001-07-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q2719611 | 2001-06-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q3489488 | 1989-01-01 | Paper |