287 results on '"Qin, Baodong"'
Search Results
2. Further construction of even-variable balanced rotation symmetric Boolean functions with optimal algebraic immunity
3. Pairing-free Proxy Re-Encryption scheme with Equality Test for data security of IoT
4. A lattice-based designated-server public-key authenticated encryption with keyword search
5. A unified construction of weightwise perfectly balanced Boolean functions
6. Password-authenticated proofs of retrievability for multiple devices checking cloud data
7. Privacy-Preserving Decision Tree Classification Protocol Based on Bitwise Comparison
8. Efficient two-party SM2 signing protocol based on secret sharing
9. An MLWE-Based Cut-and-Choose Oblivious Transfer Protocol.
10. Improved Security Model for Public-Key Authenticated Encryption with Keyword Search
11. Forward-Secure Revocable Identity-Based Encryption
12. Public-key encryption with bidirectional keyword search and its application to encrypted emails
13. Privacy-Preserving Decision Tree Classification Protocol Based on Bitwise Comparison
14. EFTA: An Efficient and Fault-Tolerant Data Aggregation Scheme without TTP in Smart Grid.
15. Non-Malleable Functions and their Applications
16. Key regeneration-free ciphertext-policy attribute-based encryption and its application
17. Public-key authenticated encryption with keyword search revisited: Security model and constructions
18. An Improved Coppersmith Algorithm Based on Block Preprocessing
19. An efficient fuzzy certificateless signature-based authentication scheme using anonymous biometric identities for VANETs
20. A YAP/TAZ-induced feedback mechanism regulates Hippo pathway homeostasis
21. Regularly Lossy Functions and Applications
22. Server-Aided Revocable Attribute-Based Encryption Resilient to Decryption Key Exposure
23. Forward-Secure Revocable Identity-Based Encryption
24. User Revocation in Identity-Based Encryption and Attribute-Based Encryption
25. Improved Security Model for Public-Key Authenticated Encryption with Keyword Search
26. (Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance
27. Fuzzy Public-Key Encryption Based on Biometric Data
28. How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks
29. Non-Malleable Functions and Their Applications
30. Server-Aided Revocable Attribute-Based Encryption
31. Related-key secure key encapsulation from extended computational bilinear Diffie–Hellman
32. Space efficient revocable IBE for mobile devices in cloud computing
33. Escrow free attribute-based signature with self-revealability
34. Continuous Non-malleable Key Derivation and Its Application to Related-Key Security
35. Server-Aided Revocable Identity-Based Encryption
36. Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
37. Registered Keyword Searchable Encryption Based on SM9
38. A New Construction of Weightwise Perfectly Balanced Functions with High Weightwise Nonlinearity
39. Privacy-Preserving Decision-Tree Evaluation with Low Complexity for Communication
40. Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing
41. Server-Aided Revocable Attribute-Based Encryption Resilient to Decryption Key Exposure
42. Data secure de-duplication and recovery based on public key encryption with keyword search
43. Token-Based Biometric Enhanced Key Derivation for Authentication Over Wireless Networks
44. Association de la signalisation Tyro3/Axl/Mer avec la réaction inflammatoire et l’activité de la maladie dans le syndrome de Gougerot-Sjögren primitif
45. The association of Tyro3/Axl/Mer signaling with inflammatory response, disease activity in patients with primary Sjögren's syndrome
46. A Differential Privacy Budget Allocation Algorithm Based on Out-of-Bag Estimation in Random Forest
47. Generic Construction of Forward-Secure Revocable Identity-Based Signature and Lattice-Based Instantiations
48. LR-RRA-CCA secure functional encryption for randomized functionalities from trapdoor HPS and LAF
49. A new construction on randomized message-locked encryption in the standard model via UCEs
50. Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.