From post

Forward Secure Searchable Encryption Using Key-Based Blocks Chain Technique.

, , , , , , и . ICA3PP (4), том 11337 из Lecture Notes in Computer Science, стр. 85-97. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Practical Escrow Protocol for Bitcoin., , , , , и . IEEE Trans. Inf. Forensics Secur., (2020)Universal designated verifier transitive signatures for graph-based big data., , , , и . Inf. Sci., (2015)Efficient threshold password-authenticated secret sharing protocols for cloud computing., , , , , , , , и . J. Parallel Distributed Comput., (2019)Lattice-based zero-knowledge arguments for additive and multiplicative relations., , , и . Des. Codes Cryptogr., 89 (5): 925-963 (2021)Cooperative attribute-based access control for enterprise computing system., , , , и . Int. J. Embed. Syst., 7 (3/4): 191-202 (2015)Towards secure and cost-effective fuzzy access control in mobile cloud computing., , , , и . Soft Comput., 21 (10): 2643-2649 (2017)A Trust and Privacy Preserving Handover Authentication Protocol for Wireless Networks., , , и . Trustcom/BigDataSE/ISPA, стр. 138-143. IEEE, (2016)Adding Confidential Transactions to Cryptocurrency IOTA with Bulletproofs., , и . NSS, том 11058 из Lecture Notes in Computer Science, стр. 32-45. Springer, (2018)Separable Linkable Threshold Ring Signatures., , , , , и . INDOCRYPT, том 3348 из Lecture Notes in Computer Science, стр. 384-398. Springer, (2004)Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract)., , и . ACISP, том 3108 из Lecture Notes in Computer Science, стр. 325-335. Springer, (2004)