96 results on '"Weng, Jian"'
Search Results
2. Surgical management and long-term outcomes of primary intracranial leiomyosarcoma: a case series and review of literature
3. The clinical, radiological, and immunohistochemical characteristics and outcomes of primary intracranial gliosarcoma: a retrospective single-centre study
4. Proxy Re-encryption
5. Tightly Secure IBE Under Constant-Size Master Public Key
6. Time-dependent Ginzburg–Landau model for light-induced superconductivity in the cuprate LESCO
7. CCA-Secure Keyed-Fully Homomorphic Encryption
8. Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof (Extended Abstract)
9. (Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond
10. The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions
11. Handling Multiple Objectives with Integration of Particle Swarm Optimization and Extremal Optimization
12. Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
13. Multi-gait recognition using hypergraph partition
14. Pseudorandom Generators from Regular One-Way Functions: New Constructions with Improved Parameters
15. Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles
16. Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks
17. Accountable Authority Identity-Based Encryption with Public Traceability
18. A Generic Approach for Providing Revocation Support in Secret Handshake
19. Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
20. New Chosen Ciphertext Secure Public Key Encryption in the Standard Model with Public Verifiability
21. On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010
22. Optionally Identifiable Private Handshakes
23. Generic Constructions of Parallel Key-Insulated Encryption
24. Zero-Knowledge Argument for Simultaneous Discrete Logarithms
25. Efficient Unidirectional Proxy Re-Encryption
26. Self-enforcing Private Inference Control
27. Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
28. Conditional Proxy Broadcast Re-Encryption
29. Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
30. Identity-Based Threshold Key-Insulated Encryption without Random Oracles
31. Identity-Based Key-Insulated Signature Without Random Oracles
32. Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction
33. Identity-Based Key-Insulated Signature with Secure Key-Updates
34. Cloud-based electronic health record system supporting fuzzy keyword search
35. CCA-Secure Keyed-Fully Homomorphic Encryption
36. The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions
37. Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof (Extended Abstract)
38. Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
39. Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles
40. Accountable Authority Identity-Based Encryption with Public Traceability
41. Pseudorandom Generators from Regular One-Way Functions: New Constructions with Improved Parameters
42. Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks
43. New Chosen Ciphertext Secure Public Key Encryption in the Standard Model with Public Verifiability
44. A Generic Approach for Providing Revocation Support in Secret Handshake
45. On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010
46. Efficient Unidirectional Proxy Re-Encryption
47. Optionally Identifiable Private Handshakes
48. Conditional Proxy Broadcast Re-Encryption
49. Self-enforcing Private Inference Control
50. Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.