768 results on '"DEBIAO HE"'
Search Results
202. Algebraic Signatures-Based Data Integrity Auditing for Efficient Data Dynamics in Cloud Computing.
203. A Blockchain-Based Searchable Public-Key Encryption With Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks.
204. Designated-verifier proof of assets for bitcoin exchange using elliptic curve cryptography.
205. Certificateless Public Auditing Scheme With Data Privacy and Dynamics in Group User Model of Cloud-Assisted Medical WSNs
206. A survey on privacy protection in blockchain system.
207. Blockchain in healthcare applications: Research challenges and opportunities.
208. Privacy-preserving incentive and rewarding scheme for crowd computing in social media.
209. Improved secure fuzzy auditing protocol for cloud data storage.
210. Secure Key Agreement and Key Protection for Mobile Device User Authentication.
211. Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing.
212. An Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks.
213. BBARS: Blockchain-Based Anonymous Rewarding Scheme for V2G Networks.
214. Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical Internet of Things.
215. Ideal Lattice-Based Anonymous Authentication Protocol for Mobile Devices.
216. A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks.
217. Anonymous and Efficient Message Authentication Scheme for Smart Grid.
218. Pairing-Free Identity-Based Encryption with Authorized Equality Test in Online Social Networks.
219. Isogeny-Based Cryptography: A Promising Post-Quantum Technique.
220. Incentive and Unconditionally Anonymous Identity-Based Public Provable Data Possession.
221. Parking Management: A Blockchain-Based Privacy-Preserving System.
222. Blockchain-Based Mutual-Healing Group Key Distribution Scheme in Unmanned Aerial Vehicles Ad-Hoc Network.
223. Authenticated key agreement scheme for fog-driven IoT healthcare system.
224. Weakness Analysis and Improvement of a Gateway-Oriented Password-Based Authenticated Key Exchange Protocol
225. PpNNT: Multi-Party Privacy-Preserving Neural Network Training System
226. Quantum2FA: Efficient Quantum-Resistant Two-Factor Authentication Scheme for Mobile Devices
227. High-throughput block cipher implementations with SIMD.
228. A blockchain-based conditional privacy-preserving authentication scheme for edge computing services.
229. An adaptive access control scheme based on trust degrees for edge computing.
230. Secure and Efficient Two-Factor Authentication Protocol Using RSA Signature for Multi-server Environments.
231. Certificateless searchable public key encryption scheme secure against keyword guessing attacks for smart healthcare.
232. SecBCS: a secure and privacy-preserving blockchain-based crowdsourcing system.
233. BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0.
234. Efficient and secure searchable encryption protocol for cloud-based Internet of Things.
235. Attribute-based fuzzy identity access control in multicloud computing environments.
236. Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption.
237. Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps.
238. An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage.
239. Signature-based three-factor authenticated key exchange for internet of things applications.
240. A general compiler for password-authenticated group key exchange protocol in the standard model.
241. A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network.
242. A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks.
243. Certificateless Public Key Authenticated Encryption With Keyword Search for Industrial Internet of Things.
244. Certificateless Provable Data Possession Scheme for Cloud-Based Smart Grid Data Management Systems.
245. Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things.
246. Efficient and Provably Secure Distributed Signing Protocol for Mobile Devices in Wireless Networks.
247. Privacy-preserving auditing scheme for shared data in public clouds.
248. Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services.
249. On the Challenges in Designing Identity-Based Privacy-Preserving Authentication Schemes for Mobile Devices.
250. Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.