68 results on '"Zhenfu Cao"'
Search Results
2. Proof of Multicopy via Proof of File Position in Cloud.
3. Special Issue on Advanced Cryptographic Techniques for Cloud and Big Data Computation.
4. Almost-Tight Identity Based Encryption Against Selective Opening Attack.
5. Efficient and secure electronic resume using smart cards.
6. Novel conic-based group signature scheme with revocation.
7. L-WMxD: Lexical based Webmail XSS Discoverer.
8. SDSM: A secure data service mechanism in mobile cloud computing.
9. Multi-Use Unidirectional Proxy Re-Encryption.
10. Efficient signature-encryption scheme for mobile computation.
11. Bilinear-pairings based designated-verifier multi-proxy multi-signature scheme.
12. Some basic principles for proxy signature schemes based on ECDLP.
13. SecCloud: Bridging Secure Storage and Computation in Cloud.
14. An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs.
15. An Identity Based Proxy Signature Scheme Secure in the Standard Model.
16. A Dependable Threshold Broadcast Encryption System for Key Distribution in Mobile Ad Hoc Network.
17. Certificateless Threshold Signature for Data Report Authentication in Mobile Ad Hoc Network.
18. An Insider-Resistant Group Key Exchange Protocol without Signatures.
19. Extended attribute based encryption for private information retrieval.
20. About the security for HW threshold proxy signature scheme with self-certified public key system.
21. Threshold Proxy Re-Signature.
22. Bilinear-pairings based designated-verifier multi-proxy signatue scheme.
23. Multi-Receiver Identity-Based Encryption in Multiple PKG Environment.
24. A New Dynamic Group Key Management Scheme with Low Rekeying Cost.
25. Short Group Signature Without Random Oracles.
26. A Novel Compromise-Resilient Authentication System for Wireless Mesh Networks.
27. Proxy Re-signature Schemes Without Random Oracles.
28. Transitive Signatures from Braid Groups.
29. ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks.
30. Crypanalysis of Kuo and Chen's Threshold Proxy Signature Scheme Based on the RSA.
31. Design of Smart Card-based Electronic Vita using Proxy Signature Technique.
32. Cryptanalysis and Improvement of Choie et al.'s Authenticated Key Agreement Protocols.
33. Identity Based Key Insulated Signature.
34. Remote Authentication with Forward Security.
35. Efficient Password-Based Authentication and Key Exchange Scheme Preserving User Privacy.
36. Efficient ID-based Broadcast Threshold Decryption in Ad Hoc Network.
37. Group Oriented Deniable Authentication Protocol.
38. Cryptanalysis of Chang-Lin-Lam's ID-based Multisignature Scheme.
39. Cryptanalysis on a Proxy Multi-Signature Scheme.
40. Two-Pass ID-Based Authenticated Key Agreement Protocol with Key Confirmation Using Pairings.
41. Designated Verifier Proxy Signature Scheme from Bilinear Pairings.
42. An Efficient ID-Based Multi-proxy Multi-Signature Scheme.
43. A Proxy-Protected Signature Scheme Based on Finite Automaton.
44. Cryptanalysis and Improvement on An ID-Based Key Issuing Protocol.
45. An Improvement of an Identity-Based Key Issuing Protocol.
46. Efficient non-interactive deniable authentication protocols.
47. Formalized security model of multi-proxy signature schemes.
48. A new proxy blind signature scheme with warrant.
49. Improvement of multi-proxy signature scheme.
50. A nonrepudiable multi-proxy multi-signature scheme.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.