Search

Your search keyword '"forward security"' showing total 235 results

Search Constraints

Start Over You searched for: Descriptor "forward security" Remove constraint Descriptor: "forward security"
235 results on '"forward security"'

Search Results

201. Set signatures and their applications.

202. A Generic Construction for Intrusion-Resilient Signatures from Linear Feedback Shift Register.

203. From Identification to Signatures Via the Fiat-Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security.

204. Server-assisted forward-secure threshold signature.

205. A new forward-secure authenticated encryption scheme with message linkages.

206. Hierarchical time-based information release.

207. Fine-grained forward-secure signature schemes without random oracles

208. A New Efficient Group Signature With Forward Security.

209. Forward-secure multisignature and blind signature schemes

210. Improvement of digital signature with message recovery using self-certified public keys and its variants

211. Improvement of digital signature with message recovery and its variants based on elliptic curve discrete logarithm problem

212. A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage

213. On the Tightness of Forward-Secure Signature Reductions

214. One forward-secure signature scheme using bilinear maps and its applications.

215. Forward-secure linkable ring signatures from bilinear maps

216. Forward-secure identity-based signature: Security notions and construction

217. Authenticated Group Key Agreement Protocol without Pairing

219. Efficient identity based signcryption scheme with public verifiability and forward security.

220. Identity‐and‐data privacy forward security public auditing protocol in the standard model.

221. 擬似乱数の安全性に関する研究

222. Fine-grained forward-secure signature schemes without random oracles

224. Förbättring av integritetsförsäkring av loggar sett från tillfälligt bortkopplade enheter

225. Forward Secure Non-Interactive Key Exchange

226. Improving Integrity Assurances of Log Entries From the Perspective of Intermittently Disconnected Devices

227. An improved proxy blind signature scheme based on ECDLP

228. APRAP: Another privacy preserving RFID authentication protocol

229. From Identification to Signatures Via the Fiat-Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security

230. APRAP: Another Privacy Preserving RFID Authentication Protocol

231. Signcryption scheme with public verifiability and forward security.

232. Preface.

233. A Note on an Improved Self-Healing Group Key Distribution Scheme.

234. Cryptanalysis of an Efficient Threshold Self-Healing Key Distribution Scheme.

235. A Secure Elliptic Curve-Based RFID Protocol

Catalog

Books, media, physical & digital resources