1

Self-generated-certificate public key encryption without pairing and its application

Year:
2011
Language:
english
File:
PDF, 282 KB
english, 2011
2

Key updating technique in identity-based encryption

Year:
2011
Language:
english
File:
PDF, 351 KB
english, 2011
8

Accountable authority key policy attribute-based encryption

Year:
2012
Language:
english
File:
PDF, 197 KB
english, 2012
35

On the Non - Existence of Perfect Codes with Rank Distance

Year:
1996
Language:
english
File:
PDF, 347 KB
english, 1996
36

Comments on a theorem on grid access control

Year:
2006
Language:
english
File:
PDF, 91 KB
english, 2006
37

Comments on an access control model in semantic grid

Year:
2006
Language:
english
File:
PDF, 108 KB
english, 2006
38

A genetic clustering method for intrusion detection

Year:
2004
Language:
english
File:
PDF, 480 KB
english, 2004
39

Identity oriented signature scheme based on quadratic residues

Year:
2005
Language:
english
File:
PDF, 192 KB
english, 2005
41

A dynamic threshold commercial key escrow scheme based on conic

Year:
2005
Language:
english
File:
PDF, 148 KB
english, 2005
45

Democratic group signatures with collective traceability

Year:
2009
Language:
english
File:
PDF, 215 KB
english, 2009
46

Improvements on the WTLS protocol to avoid denial of service attacks

Year:
2005
Language:
english
File:
PDF, 156 KB
english, 2005
47

Certificateless threshold cryptosystem secure against chosen-ciphertext attack

Year:
2007
Language:
english
File:
PDF, 296 KB
english, 2007
48

A tabu search approach for the minimum sum-of-squares clustering problem

Year:
2008
Language:
english
File:
PDF, 772 KB
english, 2008
49

Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism

Year:
2010
Language:
english
File:
PDF, 287 KB
english, 2010