Search

Your search keyword '"PUBLIC key cryptography"' showing total 152 results

Search Constraints

Start Over You searched for: Descriptor "PUBLIC key cryptography" Remove constraint Descriptor: "PUBLIC key cryptography" Journal security & communication networks Remove constraint Journal: security & communication networks
152 results on '"PUBLIC key cryptography"'

Search Results

1. Feasibility Analysis of Cracking RSA with Improved Quantum Circuits of the Shor's Algorithm.

2. Distributed Public Key Certificate-Issuing Infrastructure for Consortium Certificate Authority Using Distributed Ledger Technology.

3. A Low-Overhead Auditing Protocol for Dynamic Cloud Storage Based on Algebra.

4. CRT-Based Homomorphic Encryption over the Fraction.

5. A Novel High-Efficiency Password Authentication and Key Agreement Protocol for Mobile Client-Server.

6. Secure Control Using Homomorphic Encryption and Efficiency Analysis.

7. Lightweight Fine-Grained Multiowner Search over Encrypted Data in Cloud-Edge Computing.

8. Identity-Based Unidirectional Collusion-Resistant Proxy Re-Encryption from U-LWE.

9. Time-Enabled and Verifiable Secure Search for Blockchain-Empowered Electronic Health Record Sharing in IoT.

10. A Secure Certificateless Signature Scheme for Space-Based Internet of Things.

11. New Constructions of Existential Unforgeable Aggregate Signature Scheme from CSP.

12. IsoqurPEKS: An Isogeny-Based Quantum-Resistant Public-Key Encryption Scheme with Keyword Search.

13. A Lightweight Blockchain-based Public-Key Authenticated Encryption with Multi-Keyword Search for Cloud Computing.

14. A Privacy Preserving Authentication Scheme for Heterogeneous Industrial Internet of Things.

15. A Certificateless-Based Authentication and Key Agreement Scheme for IIoT Cross-Domain.

16. Dual-Server Identity-Based Encryption with Authorized Equality Test for IoT Data in Clouds.

17. SACS-ABE&B: Supervised Access Control Scheme Based on Attribute-Based Encryption and Blockchain.

18. On the Existence of Multiple RSA Private Keys.

19. Tropical Cryptography Based on Multiple Exponentiation Problem of Matrices.

20. Post-Quantum Secure Password-Authenticated Key Exchange Based on Ouroboros.

21. A New Lattice-Based Blind Ring Signature for Completely Anonymous Blockchain Transaction Systems.

22. Improved Efficient Privacy-Preserving Certificateless Provable Data Possession Scheme for Cloud Storage.

23. An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET.

24. CR-BA: Public Key Infrastructure Certificate Revocation Scheme Based on Blockchain and Accumulator.

25. IBE-Signal: Reshaping Signal into a MITM-Attack-Resistant Protocol.

26. Post-Quantum Secure Password-Authenticated Key Exchange Based on Ouroboros.

27. Post-Quantum Secure Identity-Based Encryption Scheme using Random Integer Lattices for IoT-enabled AI Applications.

28. GAP-MM: 5G-Enabled Real-Time Autonomous Vehicle Platoon Membership Management Based on Blockchain.

29. Cloud Storage Data Access Control Scheme Based on Blockchain and Attribute-Based Encryption.

30. Secure Model for IoT Healthcare System under Encrypted Blockchain Framework.

31. Semantic-Based Multi-Keyword Ranked Search Schemes over Encrypted Cloud Data.

32. A Hyperelliptic Curve Cryptosystem Based Proxy Promised Signcryption Scheme.

33. A CFL-Based Key Management Scheme for Routing-Driven Internet of Things.

34. Efficient Multibit Function Encryption for Data Security in Internet of Things.

35. Encrypted Speech Retrieval Scheme Based on Multiuser Searchable Encryption in Cloud Storage.

36. PPSEB: A Postquantum Public-Key Searchable Encryption Scheme on Blockchain for E-Healthcare Scenarios.

37. Leveled Multi-Hop Multi-Identity Fully Homomorphic Encryption.

38. Fast Implementation of Multiplication on Polynomial Rings.

39. Certificateless Reliable and Privacy-Preserving Auditing of Group Shared Data for FOG-CPSs.

40. Provably Secure Lattice-Based Self-Certified Signature Scheme.

41. Attribute Set-Based Boolean Keyword Search over Encrypted Personal Health Records.

42. A Novel Hierarchical Key Assignment Scheme for Data Access Control in IoT.

43. Practical Frequency-Hiding Order-Preserving Encryption with Improved Update.

44. Improved Verifier-Based Three-Party Password-Authenticated Key Exchange Protocol from Ideal Lattices.

45. Tree-Based Public Key Encryption with Conjunctive Keyword Search.

46. Speech Encryption Scheme Based on Ciphertext Policy Hierarchical Attribute in Cloud Storage.

47. Selective-Opening Security for Public-Key Encryption in the Presence of Parameter Subversion.

48. Hybrid Encryption Scheme for Hospital Financial Data Based on Noekeon Algorithm.

49. Secure Multi-Keyword Search and Access Control over Electronic Health Records in Wireless Body Area Networks.

50. IIBE: An Improved Identity-Based Encryption Algorithm for WSN Security.

Catalog

Books, media, physical & digital resources