48 results on '"Chow, Sherman S.M."'
Search Results
2. Multi-authority fine-grained access control with accountability and its application in cloud
3. Practical (fully) distributed signatures provably secure in the standard model
4. Post-challenge leakage in public-key encryption
5. Server-aided signatures verification secure against collusion attack
6. Blind signature and ring signature schemes: Rehabilitation and attack
7. Let’s Stride Blindfolded in a Forest: Sublinear Multi-Client Decision Trees Evaluation
8. Editorial for accountability and privacy issues in blockchain and cryptocurrency
9. A generic anti-spyware solution by access control list at kernel level
10. Practical electronic lotteries with offline TTP
11. Forward-secure multisignature and blind signature schemes
12. Position paper on blockchain technology: Smart contract and applications
13. Fork-free hybrid consensus with flexible Proof-of-Activity
14. Multi-client Predicate-only Encryption for Conjunctive Equality Tests
15. Sharding Blockchain
16. Can You Find The One for Me?
17. Updatable Block-Level Message-Locked Encryption
18. Are you The One to Share? Secret Transfer with Access Structure
19. Securing Fast Learning! Ridge Regression over Encrypted Big Data
20. A Framework of Multi-Authority Attribute-Based Encryption with Outsourcing and Revocation
21. Secure Cloud Storage Meets with Secure Network Coding
22. Special Issue on Security and Privacy in Mobile Clouds
23. Efficient Authenticated Multi-Pattern Matching
24. Password-Controlled Encryption with Accountable Break-Glass Access
25. Functional Credentials for Internet of Things
26. Cryptography for Parallel RAM from Indistinguishability Obfuscation
27. Structured Encryption with Non-interactive Updates and Parallel Traversal
28. Session details: Keynote Address
29. Related Randomness Attacks for Public Key Cryptosystems
30. Tracing and revoking leaked credentials
31. Storing Shared Data on the Cloud via Security-Mediator
32. Privacy-Preserving Public Auditing for Secure Cloud Storage
33. Multi-key leakage-resilient threshold cryptography
34. Exclusion-intersection encryption
35. Optimal Sybil-resilient node admission control
36. Practical leakage-resilient identity-based encryption from simple assumptions
37. Brief announcement
38. An efficient signcryption scheme with key privacy and its extension to ring signcryption*
39. Improving privacy and security in multi-authority attribute-based encryption
40. Security-Mediated Certificateless Cryptography.
41. Short Linkable Ring Signatures Revisited.
42. An e-Lottery Scheme Using Verifiable Random Function.
43. Efficient Identity Based Ring Signature.
44. Identity Based Delegation Network.
45. Short E-Cash.
46. Identity Based Threshold Ring Signature.
47. Identity Based Ring Signature: Why, How and What Next.
48. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.