633 results on '"Zhenfu Cao"'
Search Results
152. Remote Authentication with Forward Security.
153. Identity-Based Threshold Proxy Signature Scheme with Known Signers.
154. A Hybrid Double-layer BFT Consensus Protocol for Large-Scale IoT Blockchain
155. A Credible and Lightweight Blockchain for IOT's Data Storage and Access
156. Efficient and Privacy-Preserving Outsourced Calculation with Multiple Keys Using Chinese Remainder Theorem
157. Constructing Secure Proxy Cryptosystem.
158. On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme.
159. Two Proxy Signcryption Schemes from Bilinear Pairings.
160. Constructing Secure Warrant-Based Proxy Signcryption Schemes.
161. An Efficient Proxy-Protected Signature Scheme Based on Factoring.
162. Encryption Based on Reversible Second-Order Cellular Automata.
163. Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings.
164. A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme.
165. Efficient Non-interactive Deniable Authentication Protocols.
166. Formalized Security Model of Multi-Proxy Signature Schemes.
167. Secure Delegation-by-Warrant ID-Based Proxy Signcryption Scheme.
168. Efficient ID-Based Proxy Signature and Proxy Signcryption Form Bilinear Pairings.
169. Certificateless Threshold Signature Schemes.
170. PADP: Efficient Privacy-Preserving Data Aggregation and Dynamic Pricing for Vehicle-to-Grid Networks
171. Two Secure and Efficient Lightweight Data Aggregation Schemes for Smart Grid
172. Transformation-free proxy cryptosystems and their applications to electronic commerce.
173. Robust ID-based threshold signcryption scheme from pairings.
174. A proxy-protected signature scheme based on conic.
175. An efficient digital signature using self-certified public keys.
176. ID-based threshold decryption without random oracles and its application in key escrow.
177. Cryptanalysis of group signature scheme from ID-based signature scheme.
178. An Improved Threshold Proxy Signature Scheme Based on the RSA Cryptosystem.
179. A Generalized Proxy Signature Scheme Based on the RSA Cryptosystem.
180. A Threshold Proxy Signature Scheme Using Self-Certified Public Keys.
181. Improvement of Multi-Proxy Signature Scheme.
182. Factoring-Based Proxy Signature Schemes with Forward-Security.
183. Location privacy leaking from spectrum utilization information in database-driven cognitive radio network.
184. SESCF: A Secure and Efficient Supply Chain Framework via Blockchain-Based Smart Contracts
185. Improved File-injection Attacks on Searchable Encryption Using Finite Set Theory
186. Multi-Value-Independent Ciphertext-Policy Attribute Based Encryption with Fast Keyword Search
187. Blockchain-Based Lightweight Certificate Authority for Efficient Privacy-Preserving Location-Based Service in Vehicular Social Networks
188. LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs
189. GTSIM-POP: Game theory based secure incentive mechanism and patient-optimized privacy-preserving packet forwarding scheme in m-healthcare social networks
190. Pri-RTB: Privacy-preserving real-time bidding for securing mobile advertisement in ubiquitous computing
191. A verifiable privacy-preserving data collection scheme supporting multi-party computation in fog-based smart grid
192. PPHR: Blockchain-based Privacy Protection House Rental System
193. AP-PRE: Autonomous Path Proxy Re-Encryption and Its Applications
194. Privacy-preserving outsourced image feature extraction
195. Detecting Vehicle Anomaly in the Edge via Sensor Consistency and Frequency Characteristic
196. Improved Fault-Tolerant Aggregate Signatures
197. All-But-Many Lossy Trapdoor Functions under Decisional RSA Subgroup Assumption and Application
198. On the Diophantine Equation x 2n - Dy 2 = 1
199. Designated Server-Aided Revocable Identity-based Keyword Search on Lattice
200. Practical and Secure Circular Range Search on Private Spatial Data
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.