Search

Showing total 79 results

Search Constraints

Start Over You searched for: Topic data encryption Remove constraint Topic: data encryption Journal computer journal Remove constraint Journal: computer journal
79 results

Search Results

1. Privacy-Preserving Confidential Reporting System With Designated Reporters.

2. Optimal Symmetric Ratcheting for Secure Communication.

3. Guess-and-Determine Attacks on AEGIS.

4. Secure and Differentiated Fog-Assisted Data Access for Internet of Things.

5. Authorized Function Homomorphic Signature.

6. A New Framework of IND-CCA Secure Public Key Encryption with Keyword Search.

7. Novel Smooth Hash Proof Systems Based on Lattices.

8. Intrusion Detection Over Encrypted Network Data.

9. Cryptanalysis of a Compact Anonymous HIBE with Constant Size Private Keys.

10. Editorial: On the Security of the First Leakage-Free Certificateless Signcryption Scheme.

11. Almost-Tight Identity Based Encryption Against Selective Opening Attack.

12. Non-transferable Proxy Re-encryption.

13. Leakage Resilient CCA Security in Stronger Model: Branch Hidden ABO-LTFs and Their Applications.

14. Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions and Its Implementations.

15. Order-Hiding Range Query over Encrypted Data without Search Pattern Leakage.

16. Tightly Secure Encryption Schemes against Related-Key Attacks.

17. Structural Key Recovery of Simple Matrix Encryption Scheme Family.

18. Meet-in-the-Middle Attacks on Reduced-Round QARMA-64/128.

19. A New Software Birthmark based on Weight Sequences of Dynamic Control Flow Graph for Plagiarism Detection.

20. Improved Meet-in-the Middle Attacks on Reduced-Round TWINE-128.

21. Klepto for Ring-LWE Encryption.

22. Bounded Revocable and Outsourceable ABE for Secure Data Sharing.

23. Identity-Based Broadcast Encryption for Inner Products.

24. A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles.

25. Efficient Ring Signature and Group Signature Schemes Based on q-ary Identification Protocols.

26. Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles.

27. Efficient Homomorphic Integer Polynomial Evaluation Based on GSW FHE.

28. Cryptanalysis of A Pairing-Free Certificateless Signcryption Scheme.

29. Providing Secret Authentication in Clustered Security Architecture for Cloud-Based WBAN.

30. Authorized Equi-join for Multiple Data Contributors in the PKC-Based Setting.

31. Statistical Cipher Feedback of Stream Ciphers.

32. Partitioned Group Password-Based Authenticated Key Exchange.

33. Fully Privacy-Preserving ID-Based Broadcast Encryption with Authorization.

34. A Practical Hybrid Group Key Establishment for Secure Group Communications.

35. Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation.

36. On the Importance of Checking Multivariate Public Key Cryptography for Side-Channel Attacks: The Case of enTTS Scheme.

37. Pairing-Free and Secure Certificateless Signcryption Scheme.

38. Simpler Generic Constructions for Strongly Secure One-round Key Exchange from Weaker Assumptions.

39. Novel Leakage-Resilient Attribute-Based Encryption from Hash Proof System.

40. A Secure Role-Based Cloud Storage System For Encrypted Patient-Centric Health Records.

41. Hybrid Multi-Biometric Template Protection Using Watermarking.

42. Revocable and Decentralized Attribute-Based Encryption.

43. Image and Video Encryption based on Dual Space-Filling Curves.

44. Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large Universe.

45. An End-to-End Security Approach for Digital Document Management.

46. A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme.

47. RGB, a Mixed Multivariate Signature Scheme.

48. A Generic Method for the Analysis of a Class of Cache Attacks: A Case Study for AES.

49. Fully Secure Wicked Identity-Based Encryption Against Key Leakage Attacks.

50. Privacy-Preserving Query Processing by Multi-Party Computation.