An Implementation Suite For A Hybrid Public Key Infrastructure | 0 | 0.34 | 2021 |
On the Invisibility and Anonymity of Undeniable Signature Schemes. | 0 | 0.34 | 2020 |
A Note On The Invisibility And Anonymity Of Undeniable Signature Schemes | 0 | 0.34 | 2019 |
A Generic Framework for Accountable Optimistic Fair Exchange Protocol. | 0 | 0.34 | 2018 |
Security analysis of M-DES and key-based coded permutation ciphers in wireless channels. | 0 | 0.34 | 2018 |
From Sealed-Bid Electronic Auction to Electronic Cheque | 0 | 0.34 | 2017 |
Known Bid Attack on an Electronic Sealed-Bid Auction Scheme | 0 | 0.34 | 2017 |
On the effective subkey space of some image encryption algorithms using external key. | 2 | 0.38 | 2016 |
Twin-Beth: Security under active and concurrent attacks for the beth identity-based identification scheme | 0 | 0.34 | 2016 |
Cryptanalysis Of An Identity-Based Convertible Undeniable Signature Scheme | 0 | 0.34 | 2016 |
An efficient certificateless undeniable signature scheme | 0 | 0.34 | 2015 |
Applications of undeniable signature schemes | 1 | 0.39 | 2015 |
Cryptanalysis of a certificateless identification scheme | 2 | 0.38 | 2015 |
A provable secure pairing-free certificateless identification scheme | 0 | 0.34 | 2015 |
On the Security of Two Pairing-Based Signature Schemes | 0 | 0.34 | 2015 |
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage | 5 | 0.57 | 2015 |
An Efficient and Provable Secure Certificateless Identification Scheme in the Standard Model. | 8 | 5.73 | 2014 |
Security analysis of GCM for communication | 2 | 0.37 | 2014 |
Parallelizable MAC revisited | 0 | 0.34 | 2014 |
Defending against XML-related attacks in e-commerce applications with predictive fuzzy associative rules. | 1 | 0.35 | 2014 |
Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester | 12 | 0.57 | 2013 |
On the security of a modified Beth identity-based identification scheme | 1 | 0.36 | 2013 |
Discovering fuzzy association rule patterns and increasing sensitivity analysis of XML-related attacks | 7 | 0.46 | 2013 |
An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model. | 8 | 8.73 | 2013 |
Notes on Two Flawed Attacks on Undeniable Signature Schemes | 0 | 0.34 | 2013 |
An Efficient and Provable Secure Security-Mediated Identity-Based Identification Scheme | 0 | 0.34 | 2013 |
Policy-enhanced ANFIS model to counter SOAP-related attacks | 9 | 0.56 | 2012 |
Security models for delegated keyword searching within encrypted contents. | 3 | 0.39 | 2012 |
Efficient encryption with keyword search in mobile networks | 1 | 0.38 | 2012 |
On the realization of fuzzy identity-based identification scheme using fingerprint biometrics | 2 | 0.37 | 2012 |
Short and Efficient Identity-Based Undeniable Signature Scheme. | 0 | 0.34 | 2012 |
A variant of schnorr identity-based identification scheme with tight reduction | 1 | 0.36 | 2011 |
Cryptanalysis of a provably secure cross-realm client-to-client password-authenticated key agreement protocol of CANS '09 | 2 | 0.40 | 2011 |
On the Security of Two Fuzzy Identity-Based Signature Schemes | 1 | 0.36 | 2011 |
On the security of a robust watermarking scheme based on RDWT-SVD | 0 | 0.34 | 2011 |
On the security of a hybrid SVD-DCT watermarking method based on LPSNR | 1 | 0.35 | 2011 |
On the security of ownership watermarking of digital images based on singular value decomposition | 3 | 0.44 | 2011 |
Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings | 18 | 0.90 | 2010 |
Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings | 23 | 1.31 | 2010 |
Analysis on the improved SVD-based watermarking scheme | 2 | 0.43 | 2010 |
Proxy Re-encryption with Keyword Search: New Definitions and Algorithms. | 10 | 0.54 | 2010 |
Java implementation for pairing-based cryptosystems | 10 | 0.67 | 2010 |
Attacks on a Block Based SVD Watermarking Scheme | 2 | 0.40 | 2009 |
Mobile and ubiquitous malware | 1 | 0.35 | 2009 |
Hierarchical Identity-Based Identification Schemes. | 5 | 0.55 | 2009 |
Attack on a semi-blind watermarking scheme based on singular value decomposition | 1 | 0.35 | 2009 |
Differential a1ttack on five rounds of the SC2000 block cipher | 6 | 0.54 | 2009 |
Attacks on SVD-Based Watermarking Schemes | 4 | 0.43 | 2008 |
On the Security of an Identity-Based Aggregate Signature Scheme | 0 | 0.34 | 2008 |
An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model | 4 | 0.43 | 2008 |