Publication | Date of Publication | Type |
---|
Public key based searchable encryption with fine-grained sender permission control | 2023-04-13 | Paper |
Efficient and secure outsourcing of differentially private data publication | 2022-08-25 | Paper |
Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key | 2021-06-30 | Paper |
Multilevel similarity model for high-resolution remote sensing image registration | 2021-03-16 | Paper |
Privacy-preserving naive Bayes classifiers secure against the substitution-then-comparison attack | 2020-09-08 | Paper |
Differentially private naive Bayes learning over multiple data sources | 2020-09-08 | Paper |
Insight of the protection for data security under selective opening attacks | 2020-07-02 | Paper |
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing | 2020-02-06 | Paper |
Simulation-based selective opening security for receivers under chosen-ciphertext attacks | 2019-05-24 | Paper |
Hedged nonce-based public-key encryption: adaptive security under randomness failures | 2018-05-16 | Paper |
Design and theoretical analysis of virtual machine placement algorithm based on peak workload characteristics | 2018-02-27 | Paper |
Privacy-preserving outsourcing of image feature extraction in cloud computing | 2018-02-27 | Paper |
Model approach to grammatical evolution: deep-structured analyzing of model and representation | 2018-02-27 | Paper |
CDPS: a cryptographic data publishing system | 2017-09-07 | Paper |
Identity-Based Encryption with Outsourced Revocation in Cloud Computing | 2017-05-16 | Paper |
Verifiable Computation over Large Database with Incremental Updates | 2017-05-16 | Paper |
Secure Auditing and Deduplicating Data in Cloud | 2017-05-16 | Paper |
Secure Distributed Deduplication Systems with Improved Reliability | 2017-05-16 | Paper |
Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage | 2016-09-02 | Paper |
Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures | 2016-08-31 | Paper |
N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks | 2016-05-06 | Paper |
Identity-based chameleon hashing and signatures without key exposure | 2016-01-14 | Paper |
A short non-delegatable strong designated verifier signature | 2015-11-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q3193628 | 2015-10-28 | Paper |
Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts | 2015-09-29 | Paper |
Secure deduplication storage systems supporting keyword search | 2015-08-31 | Paper |
Verifiable Computation over Large Database with Incremental Updates | 2015-07-24 | Paper |
Efficient algorithms for secure outsourcing of bilinear pairings | 2014-12-02 | Paper |
TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage | 2014-07-24 | Paper |
New Algorithms for Secure Outsourcing of Modular Exponentiations | 2013-10-23 | Paper |
Generic security-amplifying methods of ordinary digital signatures | 2012-10-17 | Paper |
A Short Non-delegatable Strong Designated Verifier Signature | 2012-09-07 | Paper |
Identity-based trapdoor mercurial commitments and applications | 2011-10-10 | Paper |
Hidden attribute-based signatures without anonymity revocation | 2010-06-11 | Paper |
Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems | 2010-04-24 | Paper |
Privacy-Aware Attribute-Based Encryption with User Accountability | 2009-09-29 | Paper |
Generic Security-Amplifying Methods of Ordinary Digital Signatures | 2008-06-13 | Paper |
Practical Threshold Signatures Without Random Oracles | 2008-06-10 | Paper |
Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature | 2008-06-10 | Paper |