Search

Your search keyword '"bilinear map"' showing total 816 results

Search Constraints

Start Over You searched for: Descriptor "bilinear map" Remove constraint Descriptor: "bilinear map"
816 results on '"bilinear map"'

Search Results

1. Decomposing finite [formula omitted]-algebras.

2. Growth of bilinear maps II: bounds and orders.

3. A survey on attribute-based encryption for Internet of Things.

4. Efficient and provably-secure certificateless sequential aggregate signature scheme

5. Lightweight Anonymous Communication Model Based on Anonymous IBE

6. Efficient Attribute-Based Proxy Re-Encryption with Constant Size Ciphertexts

7. Scalable, password-based and threshold authentication for smart homes.

8. Jordan maps and zero Lie product determined algebras: Dedicated to Vesselin Drensky on his 70th birthday.

9. The review on elliptic curves as cryptographic pairing groups

10. LacminCC: lightweight anonymous communication model in cloud computing

11. 高效可证明安全的无证书有序聚合签名方案.

12. Double-Blind Compact E-cash from Bilinear Map.

13. Cryptanalysis of a Secure and Privacy Preserving Mobile Wallet Scheme with Outsourced Verification in Cloud Computing

14. A t-out-of-n Redactable Signature Scheme

15. Bilinear cryptography using Lie algebras from p-groups

16. Aitac: an identity-based traceable anonymous communication model.

17. Triple receiver public key encryption cryptosystem

18. Triple receiver public key encryption cryptosystem

19. On the Properties of the Arens Regularity of Bounded Bilinear Mappings

20. $n$-factorization Property of Bilinear Mappings

21. Geometrical foundations of the sampling design with fixed sample size

22. Forward-Secure Linkable Ring Signatures

23. Cryptanalysis and Improvement of a Strongly Unforgeable Identity-Based Signature Scheme

24. A Bilinear Map Pairing Based Authentication Scheme for Smart Grid Communications: PAuth

25. Cryptanalysis and Improvement of an Identity-Based Proxy Multi-signature Scheme

26. LacminCC: lightweight anonymous communication model in cloud computing.

27. An efficient identity-based signature scheme with provable security.

28. Guaranteeing Correctness of Bulk Operations in Outsourced Databases

29. A User Authentication Scheme Based on Trusted Platform for Cloud Computing

30. Group Signature with Deniability: How to Disavow a Signature

31. Public Key Timed-Release Attribute-Based Encryption

32. A Hierarchical Identity-Based Signature from Composite Order Bilinear Groups

33. Unique Signature with Short Output from CDH Assumption

34. Secure and Efficient Scheme for Delegation of Signing Rights

35. Constant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent Assumption

36. Efficient File Sharing in Electronic Health Records

37. Vector Bundles

40. Improved method for finding optimal formulas for bilinear maps in a finite field.

41. Bilinear maps and graphs.

42. Analysis and Improvement on a Mobile Payment Protocol with Outsourced Verification in Cloud Service.

43. m-WEAK AMENABILITY OF (2n)TH DUALS OF BANACH ALGEBRAS.

44. Efficient Zero-Knowledge Proofs of Graph Signature for Connectivity and Isolation Using Bilinear-Map Accumulator

45. Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency

46. A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release

48. Finding Optimal Formulae for Bilinear Maps

49. Hierarchical attention and feature projection for click-through rate prediction

Catalog

Books, media, physical & digital resources