Functional Encryption for Pattern Matching with a Hidden String | 0 | 0.34 | 2022 |
Pattern Matching over Encrypted Data with a Short Ciphertext | 0 | 0.34 | 2021 |
Utilizing QR codes to verify the visual fidelity of image datasets for machine learning | 0 | 0.34 | 2021 |
P2DPI: Practical and Privacy-Preserving Deep Packet Inspection | 0 | 0.34 | 2021 |
Secure Computation of Shared Secrets and Its Applications | 0 | 0.34 | 2021 |
Identity-Based Unidirectional Proxy Re-encryption in Standard Model - A Lattice-Based Construction. | 0 | 0.34 | 2020 |
Identity-based Unidirectional Proxy Re-Encryption and Re-Signature in Standard Model: Lattice-based Constructions. | 0 | 0.34 | 2020 |
Inspecting TLS Anytime Anywhere: A New Approach to TLS Interception | 0 | 0.34 | 2020 |
Efficient Decentralized Random Commitment Key Generation For Mixnet Shuffle Proof | 0 | 0.34 | 2019 |
Ciphertext-Delegatable Cp-Abe For A Dynamic Credential: A Modular Approach | 1 | 0.35 | 2019 |
Generic Construction of Fair Exchange Scheme with Semi-Trusted Adjudicator. | 0 | 0.34 | 2019 |
A New Encoding Framework for Predicate Encryption with Non-linear Structures in Prime Order Groups. | 0 | 0.34 | 2019 |
Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing. | 0 | 0.34 | 2019 |
Guest Editorial: Security and Privacy for Contemporary Network Computing Environment. | 0 | 0.34 | 2019 |
Qr Code Watermarking For Digital Images | 0 | 0.34 | 2019 |
On the Security of a Privacy-Preserving Ranked Multi-Keyword Search Scheme. | 0 | 0.34 | 2019 |
Efficient Controlled Signature for a Large Network with Multi Security-level Setting. | 0 | 0.34 | 2019 |
Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes. | 0 | 0.34 | 2019 |
Subversion in Practice: How to Efficiently Undermine Signatures. | 1 | 0.40 | 2018 |
A privacy preserving and fine-grained access control scheme in DaaS based on efficient DSP re-encryption. | 0 | 0.34 | 2018 |
IEEE Access Special Section Editorial: Security and Privacy in Applications and Services for Future Internet of Things. | 1 | 0.36 | 2018 |
How to Protect ADS-B: Confidentiality Framework and Efficient Realization Based on Staged Identity-Based Encryption. | 5 | 0.43 | 2017 |
A New ADS-B Authentication Framework Based on Efficient Hierarchical Identity-Based Signature with Batch Verification. | 8 | 0.50 | 2017 |
Lightweight Security Protocol for ECG Bio-Sensors. | 2 | 0.40 | 2017 |
Video Games and Virtual Reality as Persuasive Technologies for Health Care: An Overview. | 0 | 0.34 | 2017 |
Efficient Generic Construction of CCA-Secure Identity-Based Encryption from Randomness Extraction. | 2 | 0.36 | 2016 |
Lightweight Encryption for Smart Home | 3 | 0.43 | 2016 |
Efficient Subversion Of Symmetric Encryption With Random Initialization Vector | 0 | 0.34 | 2016 |
Secure Communication in Civil Drones | 0 | 0.34 | 2015 |
Server-Aided Verification Signature with Privacy for Mobile Computing. | 0 | 0.34 | 2015 |
Making air traffic surveillance more reliable: a new authentication framework for automatic dependent surveillance-broadcast (ADS-B) based on online/offline identity-based signature. | 4 | 0.50 | 2015 |
On the power consumption of cryptographic processors in civil microdrones | 0 | 0.34 | 2015 |
How to protect ADS-B: Confidentiality framework for future air traffic communication | 2 | 0.40 | 2015 |
Forward-Secure Identity-Based Signature: New Generic Constructions and Their Applications. | 3 | 0.42 | 2013 |
Stateful Public-Key Encryption Schemes Forward-Secure Against State Exposure | 0 | 0.34 | 2013 |
An Authentication Framework for Automatic Dependent Surveillance-Broadcast Based on Online/Offline Identity-Based Signature | 6 | 0.61 | 2013 |
An Efficient And Secure Service Discovery Protocol For Ubiquitous Computing Environments | 0 | 0.34 | 2012 |
Efficient Generic Construction of Forward-Secure Identity-Based Signature | 0 | 0.34 | 2012 |
Smart-frame: A flexible, scalable, and secure information management framework for smart grids | 0 | 0.34 | 2012 |
On shortening ciphertexts: new constructions for compact public key and stateful encryption schemes | 2 | 0.38 | 2011 |
Study on Secret Sharing Schemes (SSS) and their applications | 2 | 0.37 | 2011 |
An efficient and scalable re-authentication protocol over wireless sensor network | 5 | 0.52 | 2011 |
Survey on certificateless public key cryptography. | 2 | 0.38 | 2011 |
On the security of the identity-based encryption based on DHIES from ASIACCS 2010 | 2 | 0.39 | 2011 |
Compact identity-based encryption without strong symmetric cipher | 0 | 0.34 | 2011 |
Survey on computationally hard problems and their applications to cryptography. | 0 | 0.34 | 2011 |
The use of Boolean functions in stream ciphers. | 0 | 0.34 | 2011 |
A privacy-preserving secure service discovery protocol for ubiquitous computing environments | 5 | 0.48 | 2010 |
Authentication and key establishment in dynamic wireless sensor networks. | 14 | 0.63 | 2010 |
Efficient online/offline identity-based signature for wireless sensor network | 56 | 1.77 | 2010 |