1

Group commitment protocol based on zero knowledge proofs

Year:
1995
Language:
english
File:
PDF, 409 KB
english, 1995
2

Algebraic operations on encrypted relational databases

Year:
1993
Language:
english
File:
PDF, 549 KB
english, 1993
7

New dynamic ID authentication scheme using smart cards

Year:
2010
Language:
english
File:
PDF, 179 KB
english, 2010
8

Controlling access in tree hierarchies

Year:
1994
Language:
english
File:
PDF, 466 KB
english, 1994
10

Remote login authentication scheme based on a geometric approach

Year:
1995
Language:
english
File:
PDF, 565 KB
english, 1995
11

Access control with binary keys

Year:
1994
Language:
english
File:
PDF, 416 KB
english, 1994
12

A geometric approach for sharing secrets

Year:
1995
Language:
english
File:
PDF, 680 KB
english, 1995
13

Authenticating passwords over an insecure channel

Year:
1996
Language:
english
File:
PDF, 731 KB
english, 1996
14

A hashing-oriented nearest neighbor searching scheme

Year:
1993
Language:
english
File:
PDF, 379 KB
english, 1993
15

Cryptographic key assignment scheme for access control in a hierarchy

Year:
1992
Language:
english
File:
PDF, 479 KB
english, 1992
17

A conference key distribution system based on cross-product

Year:
1993
Language:
english
File:
PDF, 460 KB
english, 1993
19

Convertible multi-authenticated encryption scheme

Year:
2008
Language:
english
File:
PDF, 157 KB
english, 2008
23

A binary access control method using prime factorization

Year:
1997
Language:
english
File:
PDF, 486 KB
english, 1997
24

Improvement of threshold proxy signature scheme

Year:
2003
Language:
english
File:
PDF, 79 KB
english, 2003
27

ID-based group-oriented cryptosystem and its digital signature scheme

Year:
1997
Language:
english
File:
PDF, 854 KB
english, 1997
28

Group-oriented authentication mechanism with key exchange

Year:
1998
Language:
english
File:
PDF, 1.38 MB
english, 1998
29

Delegated multisignature scheme with document decomposition

Year:
2001
Language:
english
File:
PDF, 138 KB
english, 2001
31

Retrieving similar pictures from iconic databases using G-tree

Year:
1997
Language:
english
File:
PDF, 608 KB
english, 1997
32

A refinement of a compression-oriented addressing scheme

Year:
1993
Language:
english
File:
PDF, 266 KB
english, 1993
35

An exact match retrieval scheme based upon principal component analysis

Year:
1995
Language:
english
File:
PDF, 364 KB
english, 1995
36

Application of geometric hashing to iconic database retrieval

Year:
1994
Language:
english
File:
PDF, 351 KB
english, 1994
43

Retrieving the most similar symbolic pictures from pictorial databases

Year:
1992
Language:
english
File:
PDF, 628 KB
english, 1992
44

Controlling the access requests in an information protection system

Year:
1993
Language:
english
File:
PDF, 480 KB
english, 1993
50

Secure Handover Authentication Protocol Based on Bilinear Pairings

Year:
2013
Language:
english
File:
PDF, 347 KB
english, 2013