The following pages link to Information Security and Privacy (Q2817456):
Displayed 50 items.
- Statistical Disclosure Control for Data Privacy Using Sequence of Generalised Linear Models (Q2817457) (← links)
- Energy-Efficient Elliptic Curve Cryptography for MSP430-Based Wireless Sensor Nodes (Q2817458) (← links)
- Towards Privacy-Preserving Data Mining in Online Social Networks: Distance-Grained and Item-Grained Differential Privacy (Q2817460) (← links)
- Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database (Q2817461) (← links)
- Reversible Data Hiding for Encrypted Images Based on Statistical Learning (Q2817462) (← links)
- Exploring the Space of Digital Evidence – Position Paper (Q2817463) (← links)
- Towards Lightweight Anonymous Entity Authentication for IoT Applications (Q2817466) (← links)
- Hybrid MQ Signature for Embedded Device (Q2817468) (← links)
- Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations (Q2817469) (← links)
- Accelerating Oblivious Transfer with Batch Multi-exponentiation (Q2817471) (← links)
- CTM-sp: A Family of Cryptographic Hash Functions from Chaotic Tent Maps (Q2817473) (← links)
- One-Key Compression Function Based MAC with Security Beyond Birthday Bound (Q2817474) (← links)
- Towards Efficient Fully Randomized Message-Locked Encryption (Q2817475) (← links)
- Secure and Traceable Framework for Data Circulation (Q2817476) (← links)
- Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy (Q2817477) (← links)
- Exploiting the Error Correction Mechanism in QR Codes for Secret Sharing (Q2817480) (← links)
- Password Requirements Markup Language (Q2817483) (← links)
- Leakage-Resilient Functional Encryption via Pair Encodings (Q2817484) (← links)
- Secret Handshakes with Dynamic Expressive Matching Policy (Q2817485) (← links)
- Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance (Q2817487) (← links)
- Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption (Q2817488) (← links)
- Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures (Q2817489) (← links)
- A Cloud-Based Access Control Scheme with User Revocation and Attribute Update (Q2817491) (← links)
- One-Round Strong Oblivious Signature-Based Envelope (Q2817800) (← links)
- Proxy Signature with Revocation (Q2817801) (← links)
- On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures (Q2817802) (← links)
- Content-Based Encryption (Q2817803) (← links)
- Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometry (Q2817804) (← links)
- Identity-Based Group Encryption (Q2817806) (← links)
- Edit Distance Based Encryption and Its Application (Q2817807) (← links)
- Proxy Re-encryption with Delegatable Verifiability (Q2817808) (← links)
- Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions (Q2817809) (← links)
- Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage (Q2817810) (← links)
- Public Key Encryption with Authorized Keyword Search (Q2817811) (← links)
- Linear Encryption with Keyword Search (Q2817812) (← links)
- Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security (Q2817814) (← links)
- Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing (Q2817815) (← links)
- Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs (Q2817816) (← links)
- A New Attack on Three Variants of the RSA Cryptosystem (Q2817817) (← links)
- Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information (Q2817818) (← links)
- Deterministic Encoding into Twisted Edwards Curves (Q2817819) (← links)
- Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ (Q2817820) (← links)
- Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch (Q2817821) (← links)
- Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework (Q2817822) (← links)
- Authenticated Encryption with Small Stretch (or, How to Accelerate AERO) (Q2817823) (← links)
- Impossible Differential Cryptanalysis of 14-Round Camellia-192 (Q2817824) (← links)
- Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA (Q2817825) (← links)
- On the Security of the LAC Authenticated Encryption Algorithm (Q2817826) (← links)
- Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-Guessing Techniques (Q2817827) (← links)
- Reducing the Key Size of the SRP Encryption Scheme (Q2817828) (← links)