The following pages link to (Q4434881):
Displayed 41 items.
- Certificate-based signcryption with enhanced security features (Q356006) (← links)
- Certificate-based proxy decryption systems with revocability in the standard model (Q497594) (← links)
- An improved ring signature scheme without trusted key generation center for wireless sensor network (Q615215) (← links)
- Symmetric threshold multipath (STM): an online symmetric key management scheme (Q726168) (← links)
- Certificate-based verifiably encrypted signatures from pairings (Q924671) (← links)
- Provably secure certificate-based encryption with leakage resilience (Q1698724) (← links)
- Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing (Q1998834) (← links)
- Distributed key generation for SM9-based systems (Q2057137) (← links)
- An efficient certificate-based signature scheme in the standard model (Q2117039) (← links)
- Anonymous certificate-based broadcast encryption with constant decryption cost (Q2195299) (← links)
- Notes on a provably-secure certificate-based encryption against malicious CA attacks (Q2198258) (← links)
- Provably secure certificate-based proxy blind signature scheme from pairings (Q2200626) (← links)
- Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters (Q2200685) (← links)
- (Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance (Q2214962) (← links)
- Cryptanalysis and improvements of an efficient certificate-based proxy signature scheme for IIoT environments (Q2234800) (← links)
- Continuous leakage-resilient certificate-based encryption (Q2279532) (← links)
- A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model (Q2282274) (← links)
- Efficient revocable identity-based encryption via subset difference methods (Q2402970) (← links)
- Generic constructions of identity-based and certificateless kEMs (Q2425527) (← links)
- Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme (Q2438535) (← links)
- Provably secure certificate-based signature scheme without pairings (Q2446383) (← links)
- Accountable identity-based encryption with distributed private key generators (Q2656754) (← links)
- Adaptively secure certificate-based broadcast encryption and its application to cloud storage service (Q2666761) (← links)
- An Efficient and Provably Secure Certificate-Based Encryption Scheme (Q2917417) (← links)
- Towards Certificate-Based Group Encryption (Q2953867) (← links)
- Private Certificate-Based Remote Data Integrity Checking in Public Clouds (Q3196416) (← links)
- Conjunctive Broadcast and Attribute-Based Encryption (Q3392916) (← links)
- Efficient Certificate-Based Encryption in the Standard Model (Q3540041) (← links)
- Certificate-Based Signature Schemes without Pairings or Random Oracles (Q3540152) (← links)
- Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures (Q3605390) (← links)
- Asymmetric Group Key Agreement (Q3627433) (← links)
- Certified Encryption Revisited (Q3637140) (← links)
- Revocable Identity-Based Encryption Revisited: Security Model and Construction (Q4916011) (← links)
- Certificate-Based Generalized Ring Signcryption Scheme (Q4963268) (← links)
- (Q4988565) (← links)
- Efficient Certificate-Based Signature and Its Aggregation (Q5056031) (← links)
- (Q5155336) (← links)
- A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power (Q5458217) (← links)
- Security weakness of a certificate-based proxy signature scheme for IIoT environments (Q6072196) (← links)
- Fully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile Communications (Q6101445) (← links)
- Certificateless Public Key Signature Schemes from Standard Algorithms (Q6163659) (← links)