Search

Your search keyword '"random oracle model"' showing total 54 results

Search Constraints

Start Over You searched for: Descriptor "random oracle model" Remove constraint Descriptor: "random oracle model" Database Directory of Open Access Journals Remove constraint Database: Directory of Open Access Journals
54 results on '"random oracle model"'

Search Results

1. Robust Schnorr-based subgroup multi-signature scheme

2. SEPCVN: Secure and Efficient Protocol for Cloud Vehicular Networking

3. Blockchain-enhanced certificateless signature scheme in the standard model

4. A quantum resistant universal designated verifier signature proof

5. Enhancing Security and Efficiency: A Fine-Grained Searchable Scheme for Encryption of Big Data in Cloud-Based Smart Grids

6. A Secure and Privacy-Preserving Lightweight Authentication and Key Exchange Algorithm for Smart Agriculture Monitoring System

7. Robust Subgroup ID-based Multi-signature Scheme

8. Pairing-free certificateless blind signature scheme for smart grid

9. A Secure Authentication Protocol Supporting Efficient Handover for UAV

10. Secure and efficient two-party collaborative SM9 signature scheme suitable for smart home

11. A Secure User Authentication Protocol for Heterogeneous Mobile Environments

12. Security Analysis and Improvement of Strongly Secure Certificateless Digital Signature Scheme

13. RDAF-IIoT: Reliable Device-Access Framework for the Industrial Internet of Things

14. A Resource-Friendly Certificateless Proxy Signcryption Scheme for Drones in Networks beyond 5G

15. Secure Threshold Ring Signature Based on SM9

16. An Anonymous Certificateless Signcryption Scheme for Internet of Health Things

17. Towards Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks

18. Full-Resilient Memory-Optimum Multi-Party Non-Interactive Key Exchange

19. Efficient and Provably Secure Anonymous User Authentication Scheme for Patient Monitoring Using Wireless Medical Sensor Networks

20. Leveled Certificateless Fully Homomorphic Encryption Schemes From Learning With Errors

21. RKA Security for Identity-Based Signature Scheme

22. Efficient Conditional Privacy Preservation With Mutual Authentication in Vehicular Ad Hoc Networks

23. VPPCS: VANET-Based Privacy-Preserving Communication Scheme

24. LSWBVM: A Lightweight Security Without Using Batch Verification Method Scheme for a Vehicle Ad Hoc Network

25. Practical Lattice-Based Multisignature Schemes for Blockchains

26. Efficient Arbitrarily Divisible E-Cash Applicable to Secure Massive Transactions

27. Identity-Based Linkable Ring Signature Scheme

28. Certificateless Deniable Authenticated Encryption for Location-Based Privacy Protection

29. A Hash-Based Quantum-Resistant Designated Verifier Signature Scheme

30. RAFI: Robust Authentication Framework for IoT-Based RFID Infrastructure

31. A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks

32. Research on pairing-free certificateless batch anonymous authentication scheme for VANET

33. Two-factor authenticated key agreement protocol based on biometric feature and password

34. Multi-authority ABS supporting dendritic access structure

35. Research on batch anonymous authentication scheme for VANET based on bilinear pairing

36. Two improved content extraction signature schemes

37. Two improved content extraction signature schemes

38. Efficient identity-based fully homomorphic encryption over NTRU

39. Enabling Telecare Medical Information Systems With Strong Authentication and Anonymity

40. Revisiting NIZK-Based Technique for Chosen-Ciphertext Security: Security Analysis and Corrected Proofs

41. An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Secure Communication in a Vehicular Ad Hoc Network

42. Improved certificateless sequential multi-signature scheme

43. Security analysis and improvement of a certificateless signcryption scheme

44. Certificateless

45. Fair multi-party concurrent signature scheme

46. Identity-based fully homomorphic encryption from learning with error problem

47. An Aggregate Signature Scheme Based on a Trapdoor Hash Function for the Internet of Things

48. Identity-Based Encryption with Filtered Equality Test for Smart City Applications

49. Provably secure private key protection scheme for smart mobile terminal

50. Provably Secure Covert Communication on Blockchain

Catalog

Books, media, physical & digital resources