Search

Your search keyword '"Threshold cryptosystem"' showing total 474 results

Search Constraints

Start Over You searched for: Descriptor "Threshold cryptosystem" Remove constraint Descriptor: "Threshold cryptosystem"
474 results on '"Threshold cryptosystem"'

Search Results

2. Secure Multi-Party Computation of Graphs' Intersection and Union under the Malicious Model.

3. Blockchain-Based Threshold Electronic Voting System

4. HIERARCHICAL AND DYNAMIC THRESHOLD PAILLIER CRYPTOSYSTEM WITHOUT TRUSTED DEALER.

5. Privacy-Preserving Aggregation for Federated Learning-Based Navigation in Vehicular Fog

6. Distributed authentication framework for Hadoop based bigdata environment

8. Hierarchical and dynamic threshold Paillier cryptosystem without trusted dealer

10. Threshold attribute-based signcryption and its application to authenticated key agreement.

11. A restricted proxy re-encryption with keyword search for fine-grained data access control in cloud storage.

12. On the existence of provably secure cloud computing systems.

13. Threshold Cryptosystem Based on Factoring and Discrete Logarithm Problems.

14. Multi-document threshold signcryption scheme.

15. Privacy-preserving emergency access control for personal health records.

16. A novel personal health record system for handling emergency situations.

17. Collaborative Admission Control Scheme for Group-Based P2P Contents Sharing Systems.

18. A new construction of threshold cryptosystems based on RSA.

19. New constructions of dynamic threshold cryptosystem.

20. Provable Security for Public Key Cryptosystems

21. Secure rational numbers equivalence test based on threshold cryptosystem with rational numbers

22. A Threshold Cryptosystem in Secure Cloud Computations

23. Dynamic threshold ECDSA signature and application to asset custody in blockchain

24. Anonymous RFID Authentication for Cloud Services.

25. An Computation-Efficient Generalized Group-Oriented Cryptosystem.

26. Robust RSA distributed signatures for large-scale long-lived ad hoc networks.

27. Secure Audio Cryptosystem Using Hashed Image LSB watermarking and Encryption

28. Ciphertext-Only Attack on Linear Feedback Shift Register-Based Esmaeili-Gulliver Cryptosystem

29. A new ElGamal-like cryptosystem based on matrices over groupring

30. Message mapping and reverse mapping in elliptic curve cryptosystem

31. Threshold cryptosystem based on multiple cryptographic assumptions

32. Blockchain-Based Threshold Electronic Voting System

33. Improvement on Bitcoin’s Verifiable Public Randomness with Semi-Trusted Delegates

34. Threshold attribute-based signcryption and its application to authenticated key agreement

35. A Secure Code Based Cryptosystem via Random Insertions, Deletions, and Errors

36. On the existence of provably secure cloud computing systems

37. A restricted proxy re-encryption with keyword search for fine-grained data access control in cloud storage

38. Experimental optical secret sharing via an iterative phase retrieval algorithm

39. Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism

40. All-in-one group-oriented cryptosystem based on bilinear pairing

41. Efficient and Adaptive Threshold Signatures for Ad hoc networks.

42. Quantum Public-key Cryptosystem without Quantum Channels between Any Two Users using Non-orthogonal States

43. Niederreiter Cascade Combination Cryptosystem Based on the Double Public Keys

44. Efficient revocable certificateless encryption against decryption key exposure

45. An efficient ID-based Beta Cryptosystem

46. An Enhanced and Secured RSA Key Generation Scheme (ESRKGS)

47. Multi-document threshold signcryption scheme

48. Threshold Sr2n Public key Cryptosystem

49. A 256 bit implementation of ECC-RFID based system using Shamir secret sharing scheme and Keccak hash function

50. A novel public key cryptosystem based on Merkle-Hellman Knapsack Cryptosystem

Catalog

Books, media, physical & digital resources