Loading…
Leakage-resilient identity-based cryptography from minimal assumptions
Zhou, Yanwei, Yang, Bo, Qiao, Zirui, Xia, Zhe, Zhang, Mingwu, Mu, Yi
Published in Designs, codes, and cryptography (01.11.2023)
Published in Designs, codes, and cryptography (01.11.2023)
Get full text
Journal Article
Loading…
Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data
Zhang, Yue, Yu, Jia, Hao, Rong, Wang, Cong, Ren, Kui
Published in IEEE transactions on dependable and secure computing (01.05.2020)
Published in IEEE transactions on dependable and secure computing (01.05.2020)
Get full text
Journal Article
Loading…
BDSec: Security authentication protocol for BeiDou-II civil navigation message
Zhijun, Wu, Yuan, Zhang, Yiming, Yang, Peng, Wang, Meng, Yue
Published in China communications (01.06.2024)
Published in China communications (01.06.2024)
Get full text
Journal Article
Loading…
Loading…
Simulatable certificateless two-party authenticated key agreement protocol
Zhang, Lei, Zhang, Futai, Wu, Qianhong, Domingo-Ferrer, Josep
Published in Information sciences (15.03.2010)
Published in Information sciences (15.03.2010)
Get full text
Journal Article
Loading…
Loading…
Loading…
Efficient three-party authenticated key agreement protocol in certificateless cryptography
Xiong, Hu, Chen, Zhong, Qin, Zhiguang
Published in International journal of computer mathematics (01.09.2011)
Published in International journal of computer mathematics (01.09.2011)
Get full text
Journal Article
Loading…
Loading…
Delegating a Pairing Can Be Both Secure and Efficient
Canard, Sébastien, Devigne, Julien, Sanders, Olivier
Published in Applied Cryptography and Network Security (2014)
Published in Applied Cryptography and Network Security (2014)
Get full text
Book Chapter
Loading…
Against mobile attacks in Mobile Ad-hoc Networks
Shushan Zhao, Aggarwal, A
Published in 2010 IEEE International Conference on Information Theory and Information Security (01.12.2010)
Published in 2010 IEEE International Conference on Information Theory and Information Security (01.12.2010)
Get full text
Conference Proceeding
Loading…