Search

Your search keyword '"Haibo Tian"' showing total 33 results

Search Constraints

Start Over You searched for: Author "Haibo Tian" Remove constraint Author: "Haibo Tian" Topic computer Remove constraint Topic: computer
33 results on '"Haibo Tian"'

Search Results

1. Blockchain-based searchable symmetric encryption scheme

2. An Efficient Group Signature Based Digital Currency System

3. A Group Signature Based Digital Currency System

4. AFCoin: A Framework for Digital Fiat Currency of Central Banks Based on Account Model

5. A Centralized Digital Currency System with Rich Functions

6. Medical Data Management on Blockchain with Privacy

7. Fair Electronic Voting via Bitcoin Deposits

8. A Simpler Bitcoin Voting Protocol

9. Contract Coin: Toward Practical Contract Signing on Blockchain

10. Identity-based chameleon hashing and signatures without key exposure

11. A short non-delegatable strong designated verifier signature

12. A non-delegatable strong designated verifier signature in ID-based setting for mobile environment

13. A RFID Based Product Authentication Infrastructure

14. Deniability and forward secrecy of one-round authenticated key exchange

15. A systematic method to design strong designated verifier signature without random oracles

16. Deniable message transmission authenticator based on weak signature schemes

17. Dynamic asymmetric group key agreement for ad hoc networks

18. New receipt-free voting scheme using double-trapdoor commitment☆

19. A deniable authenticated key agreement protocol

20. A Hybrid System for Authentication Service

21. General Certificateless Strong Designated Verifier Signature Schemes

22. On Security Model of One-Round Authenticated Key Exchange

23. Deniably Information-Hiding Encryptions Secure against Adaptive Chosen Ciphertext Attack

24. A Non-delegatable Strong Designated Verifier Signature without Random Oracles

25. Non-interactive Deniable Authentication Protocols

26. A New Strong Multiple Designated Verifiers Signature for Broadcast Propagation

27. Comments and Improvements on Key-Exposure Free Chameleon Hashing Based on Factoring

28. Identity-Based Chameleon Hash Scheme without Key Exposure

29. Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy

30. A Deep Copy Protection Framework for Electronic Devices within Home

31. A lattice-based designated verifier signature for cloud computing

32. A new strong multiple designated verifiers signature

33. Identity-based trapdoor mercurial commitments and applications

Catalog

Books, media, physical & digital resources