849 results on '"He, Debiao"'
Search Results
2. Multi-party privacy-preserving decision tree training with a privileged party
3. Parameter-Hiding Order-Revealing Encryption Without Pairings
4. Traceable Ring Signatures from Group Actions: Logarithmic, Flexible, and Quantum Resistant
5. The governance technology for blockchain systems: a survey
6. On the Niho type locally-APN power functions and their boomerang spectrum
7. Post-quantum identity-based traitor tracing
8. The implementation of polynomial multiplication for lattice-based cryptography: A survey
9. Block Ciphers Classification Based on Randomness Test Statistic Value via LightGBM
10. FleS: A Compact and Parameter-Flexible Supersingular Isogeny Based Public Key Encryption Scheme
11. An efficient quantum-resistant undeniable signature protocol for the E-voting system
12. SM2-DualRing: Efficient SM2-based ring signature schemes with logarithmic size
13. Asymmetric Secure Multi-party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography
14. MCPAP: A MSIS-based conditional privacy-preserving authentication protocol for smart grids
15. FleS: A Compact and Parameter-Flexible Supersingular Isogeny Based Public Key Encryption Scheme
16. BCGS: Blockchain-assisted privacy-preserving cross-domain authentication for VANETs
17. An identity-based dynamic group signature scheme for reputation evaluation systems
18. Quartet: A Logarithmic Size Linkable Ring Signature Scheme from DualRing
19. A certificateless Multi-receiver Encryption scheme based on SM2 signature algorithm
20. Cryptographic Primitives in Privacy-Preserving Machine Learning: A Survey
21. Lightweight and Secure Data Sharing Based on Proxy Re-Encryption for Blockchain-Enabled Industrial Internet of Things
22. LPDB: Lightweight Policy-Driven Blockchain With Batch Verification for Rail Transit Systems
23. Lattice-based undeniable signature scheme
24. IoTChain: A Three-Tier Blockchain-based IoT Security Architecture
25. A blockchain-based conditional privacy-preserving authentication scheme for edge computing services
26. High-throughput block cipher implementations with SIMD
27. An adaptive access control scheme based on trust degrees for edge computing
28. An efficient data aggregation scheme with local differential privacy in smart grid
29. Single-Server Public-Key Authenticated Encryption With Keyword Search and Its Application in IIoT
30. A Secure and Privacy-Preserving Data Transmission Scheme in the Healthcare Framework
31. An Identity-Based Blind Signature and Its Application for Privacy Preservation in Bitcoin
32. An Efficient Blind Signature Scheme Based on SM2 Signature Algorithm
33. Quartet: A Logarithmic Size Linkable Ring Signature Scheme from DualRing
34. Load-Balanced Parallel Implementation on GPUs for Multi-Scalar Multiplication Algorithm
35. ATRC: An Anonymous Traceable and Revocable Credential System Using Blockchain for VANETs
36. A Threshold-Based Full-Decentralized Authentication and Key Agreement Scheme for VANETs Powered by Consortium Blockchain
37. Efficient Fine-Grained Data Sharing based on Proxy Re-encryption in IIoT
38. Blockchain-Based Secure Cross-Domain Data Sharing for Edge-Assisted Industrial Internet of Things
39. Efficient Blockchain-Based Mutual Authentication and Session Key Agreement for Cross-Domain IIoT
40. RCME: A Reputation Incentive Committee Consensus-Based for Matchmaking Encryption in IoT Healthcare
41. Puncturable Attribute-Based Encryption From Lattices for Classified Document Sharing
42. Auto-Updating Intrusion Detection System for Vehicular Network: A Deep Learning Approach Based on Cloud-Edge-Vehicle Collaboration
43. Blockchain-Based Lightweight Message Authentication for Edge-Assisted Cross-Domain Industrial Internet of Things
44. A Two-Layer Dynamic ECU Group Management Scheme for In-Vehicle CAN Bus
45. Fair and Privacy-Preserved Data Trading Protocol by Exploiting Blockchain
46. A Lightweight Certificateless Multi-User Matchmaking Encryption for Mobile Devices: Enhancing Security and Performance
47. Using Third-Party Auditor to Help Federated Learning: An Efficient Byzantine-robust Federated Learning
48. Efficient and Secure Two-Party Distributed Signing Protocol for the GOST Signature Algorithm
49. A Practical NIZK Argument for Confidential Transactions over Account-Model Blockchain
50. RDIC: A blockchain-based remote data integrity checking scheme for IoT in 5G networks
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.