Search

Your search keyword '"bilinear map"' showing total 815 results

Search Constraints

Start Over You searched for: Descriptor "bilinear map" Remove constraint Descriptor: "bilinear map"
815 results on '"bilinear map"'

Search Results

1. Growth of bilinear maps II: bounds and orders.

2. A survey on attribute-based encryption for Internet of Things.

3. Efficient and provably-secure certificateless sequential aggregate signature scheme

4. Lightweight Anonymous Communication Model Based on Anonymous IBE

5. Efficient Attribute-Based Proxy Re-Encryption with Constant Size Ciphertexts

6. Scalable, password-based and threshold authentication for smart homes.

7. Jordan maps and zero Lie product determined algebras: Dedicated to Vesselin Drensky on his 70th birthday.

8. The review on elliptic curves as cryptographic pairing groups

9. LacminCC: lightweight anonymous communication model in cloud computing

10. 高效可证明安全的无证书有序聚合签名方案.

11. Double-Blind Compact E-cash from Bilinear Map.

12. Cryptanalysis of a Secure and Privacy Preserving Mobile Wallet Scheme with Outsourced Verification in Cloud Computing

13. A t-out-of-n Redactable Signature Scheme

14. Bilinear cryptography using Lie algebras from p-groups

15. Aitac: an identity-based traceable anonymous communication model.

16. Triple receiver public key encryption cryptosystem

17. Triple receiver public key encryption cryptosystem

18. On the Properties of the Arens Regularity of Bounded Bilinear Mappings

19. $n$-factorization Property of Bilinear Mappings

20. Geometrical foundations of the sampling design with fixed sample size

21. Forward-Secure Linkable Ring Signatures

22. Cryptanalysis and Improvement of a Strongly Unforgeable Identity-Based Signature Scheme

23. A Bilinear Map Pairing Based Authentication Scheme for Smart Grid Communications: PAuth

24. Cryptanalysis and Improvement of an Identity-Based Proxy Multi-signature Scheme

25. LacminCC: lightweight anonymous communication model in cloud computing.

26. An efficient identity-based signature scheme with provable security.

27. Guaranteeing Correctness of Bulk Operations in Outsourced Databases

28. A User Authentication Scheme Based on Trusted Platform for Cloud Computing

29. Group Signature with Deniability: How to Disavow a Signature

30. Public Key Timed-Release Attribute-Based Encryption

31. A Hierarchical Identity-Based Signature from Composite Order Bilinear Groups

32. Unique Signature with Short Output from CDH Assumption

33. Secure and Efficient Scheme for Delegation of Signing Rights

34. Constant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent Assumption

35. Efficient File Sharing in Electronic Health Records

36. Vector Bundles

39. Improved method for finding optimal formulas for bilinear maps in a finite field.

40. Bilinear maps and graphs.

41. Analysis and Improvement on a Mobile Payment Protocol with Outsourced Verification in Cloud Service.

42. m-WEAK AMENABILITY OF (2n)TH DUALS OF BANACH ALGEBRAS.

43. Efficient Zero-Knowledge Proofs of Graph Signature for Connectivity and Isolation Using Bilinear-Map Accumulator

44. Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency

45. A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release

47. Finding Optimal Formulae for Bilinear Maps

48. Hierarchical attention and feature projection for click-through rate prediction

50. On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010

Catalog

Books, media, physical & digital resources