Search

Your search keyword '"DEBIAO HE"' showing total 403 results

Search Constraints

Start Over You searched for: Author "DEBIAO HE" Remove constraint Author: "DEBIAO HE"
403 results on '"DEBIAO HE"'

Search Results

301. On the Security of a Certificateless Proxy Signature Scheme with Message Recovery

302. Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol

303. Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation

304. Oblivious Transfer Protocols Based on Group Factoring Problem

305. fuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic Context-Free Grammars

306. One-to-many authentication for access control in mobile pay-TV systems

307. Proxy Provable Data Possession with General Access Structure in Public Clouds

308. Cryptanalysis of a certificateless aggregate signature scheme with efficient verification

309. An efficient certificateless two-party authenticated key agreement protocol

310. An efficient remote user authentication and key agreement protocol for mobile client–server environment from pairings

311. Efficient ID-based multiproxy multisignature without bilinear maps in ROM

312. A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography

313. Security Flaws in a Smart Card Based Authentication Scheme for Multi-server Environment

314. A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography

315. Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol

316. Note on ‘Design of improved password authentication and update scheme based on elliptic curve cryptography’

317. Privacy Preserving Search Schemes over Encrypted Cloud Data: A Comparative Survey

318. Special issue on Secure Computation on Encrypted Data

319. A new two-round certificateless authenticated key agreement protocol without bilinear pairings

320. An efficient and provably-secure certificateless signature scheme without bilinear pairings

321. An efficient identity-based blind signature scheme without bilinear pairings

322. A pairing-free certificateless authenticated key agreement protocol

323. An efficient and secure 3-factor user-authentication protocol for multiserver environment

324. On Diophantine equation 3a 2 x 4 − By 2 = 1

325. Provable Secure and Efficient Digital Rights Management Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography

326. Cryptanalysis of a Dynamic ID-Based Remote User Authentication Scheme with Access Control for Multi-Server Environments

327. Cryptanalysis of an Authenticated Key Agreement Protocol for Wireless Mobile Communications

328. Cryptanalysis of a Smartcard-Based User Authentication Scheme for Multi-Server Environments

329. Efficient revocable ID-based encryption with cloud revocation server

330. A secure and efficient identity-based mutual authentication scheme with smart card using elliptic curve cryptography

331. An efficient chaos-based 2-party key agreement protocol with provable security

332. Provably Secure Proxy Multi-Signature Scheme Based on ECC

333. Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol

334. Security Analysis and Improvements of a Three-Party Password-Based Key Exchange Protocol

335. Two-Step Single Slope/SAR ADC with Error Correction for CMOS Image Sensor

336. A secure temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks

337. Cryptanalysis of 'An Improved Remote Password Authentication Scheme with Smartcard'

338. Cryptanalysis and Improvement of a Password-Based Remote User Authentication Scheme without Smart Cards

339. A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks

340. Weaknesses of 'Security Analysis and Enhancement for Three-Party Password-Based Authenticated Key Exchange Protocol'

341. Insecurity of an Efficient Identity-Based Proxy Signature in the Standard Model

342. Improvement of Lee-Kim-Yoo Password-Based Key Agreement Scheme

343. Weakness Analysis and Improvement of a Gateway-Oriented Password-Based Authenticated Key Exchange Protocol

345. A new handover authentication protocol based on bilinear pairing functions for wireless networks

346. Enhanced authentication protocol for session initiation protocol using smart card

347. An Enhanced Cloud Data Storage Auditing Protocol Providing Strong Security and Efficiency for Smart City.

348. Cryptanalysis and improvement of a DoS-resistant ID-based password authentication scheme without using smart card

349. Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography.

350. New large-universe multi-authority ciphertext-policy ABE scheme and its application in cloud storage systems.

Catalog

Books, media, physical & digital resources