178 results on '"Han, Jinguang"'
Search Results
152. Cryptographic Reverse Firewalls for Identity-Based Encryption
153. Improving File Hierarchy Attribute-Based Encryption Scheme with Multi-authority in Cloud
154. Preventing Adaptive Key Recovery Attacks on the GSW Levelled Homomorphic Encryption Scheme
155. Strongly Secure Two-Party Certificateless Key Agreement Protocol with Short Message
156. Multi-cast Key Distribution: Scalable, Dynamic and Provably Secure Construction
157. An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures
158. Universally Composable Cryptographic Role-Based Access Control
159. A Secure Reverse Multi-Attribute First-Price E-Auction Mechanism Using Multiple Auctioneer Servers (Work in Progress)
160. Towards Certificate-Based Group Encryption
161. A Homomorphic Proxy Re-encryption from Lattices
162. A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model
163. Towards Proofs of Ownership Beyond Bounded Leakage
164. Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage
165. Secure and Efficient Construction of Broadcast Encryption with Dealership
166. Integrity Analysis of Authenticated Encryption Based on Stream Ciphers
167. One-Round Attribute-Based Key Exchange in the Multi-party Setting
168. Integrity Preserving Multi-keyword Searchable Encryption for Cloud Computing
169. Oblivious Keyword Search with Authorization
170. Efficient Asymmetric Index Encapsulation Scheme for Named Data
171. ID-based Data Integrity Auditing Scheme from RSA with Resisting Key Exposure
172. Secure Naïve Bayesian Classification over Encrypted Data in Cloud
173. Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update
174. Efficient Dynamic Provable Data Possession from Dynamic Binary Tree
175. Identity-Based Batch Provable Data Possession
176. Accountable Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Public Verifiability and Nonrepudiation
177. Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation.
178. The Second International Conference on Frontiers in Cyber Security - FCS 2019
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.