Search

Your search keyword '"Han, Jinguang"' showing total 178 results

Search Constraints

Start Over You searched for: Author "Han, Jinguang" Remove constraint Author: "Han, Jinguang"
178 results on '"Han, Jinguang"'

Search Results

151. Identity-Based Encryption Resilient to Continual Leakage Without Random Oracles

152. Cryptographic Reverse Firewalls for Identity-Based Encryption

154. Preventing Adaptive Key Recovery Attacks on the GSW Levelled Homomorphic Encryption Scheme

155. Strongly Secure Two-Party Certificateless Key Agreement Protocol with Short Message

156. Multi-cast Key Distribution: Scalable, Dynamic and Provably Secure Construction

157. An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures

158. Universally Composable Cryptographic Role-Based Access Control

159. A Secure Reverse Multi-Attribute First-Price E-Auction Mechanism Using Multiple Auctioneer Servers (Work in Progress)

160. Towards Certificate-Based Group Encryption

161. A Homomorphic Proxy Re-encryption from Lattices

162. A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model

163. Towards Proofs of Ownership Beyond Bounded Leakage

164. Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage

165. Secure and Efficient Construction of Broadcast Encryption with Dealership

166. Integrity Analysis of Authenticated Encryption Based on Stream Ciphers

167. One-Round Attribute-Based Key Exchange in the Multi-party Setting

168. Integrity Preserving Multi-keyword Searchable Encryption for Cloud Computing

169. Oblivious Keyword Search with Authorization

170. Efficient Asymmetric Index Encapsulation Scheme for Named Data

171. ID-based Data Integrity Auditing Scheme from RSA with Resisting Key Exposure

172. Secure Naïve Bayesian Classification over Encrypted Data in Cloud

173. Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update

174. Efficient Dynamic Provable Data Possession from Dynamic Binary Tree

175. Identity-Based Batch Provable Data Possession

176. Accountable Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Public Verifiability and Nonrepudiation

177. Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation.

Catalog

Books, media, physical & digital resources