Search

Showing total 20 results

Search Constraints

Start Over You searched for: Topic computer network security Remove constraint Topic: computer network security Topic data encryption Remove constraint Topic: data encryption Journal computer journal Remove constraint Journal: computer journal
20 results

Search Results

1. From Consensus to Atomic Broadcast: Time-Free Byzantine-Resistant Protocols without Signatures.

2. Advanced Security Technologies and Services for Future Computing Environments.

3. Structural Key Recovery of Simple Matrix Encryption Scheme Family.

4. Order-Hiding Range Query over Encrypted Data without Search Pattern Leakage.

5. Bounded Revocable and Outsourceable ABE for Secure Data Sharing.

6. Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles.

7. Efficient Homomorphic Integer Polynomial Evaluation Based on GSW FHE.

8. Efficient Ring Signature and Group Signature Schemes Based on q-ary Identification Protocols.

9. Cheating Immune Threshold Visual Secret Sharing1.

10. Efficient Identity-Based Proxy Signature in the Standard Model.

11. Signcryption Secure Against Linear Related-Key Attacks.

12. Forward-Secure Hierarchical Predicate Encryption.

13. A New and Efficient Fail-stop Signature Scheme.

14. On The Security of a Group Key Agreement Protocol.

15. Visual Cryptography Schemes with Reversing.

16. Selectively Convertible Authenticated Encryption in the Random Oracle Model.

17. Matrix FHE and Its Application in Optimizing Bootstrapping.

18. Practical Attribute-based Signature: Traceability and Revocability.

19. Identity-Based Encryption with Verifiable Outsourced Revocation.

20. Efficient Revocable Certificateless Encryption Secure in the Standard Model.