-
1
Provably secure social network privacy-preserving scheme
Published 2016-08-01Subjects: “…provable secure…”
Get full text
Article -
2
EPN:encryption padding for NTRU with provable security
Published 2008-01-01Subjects: Get full text
Article -
3
Provably secure secret sharing scheme based on bilinear maps
Published 2008-01-01Subjects: Get full text
Article -
4
Provably secure private key protection scheme for smart mobile terminal
Published 2012-12-01Subjects: Get full text
Article -
5
Analysis and improvement of a password-based authenticated key exchange protocol
Published 2010-01-01Subjects: Get full text
Article -
6
Correcting the security definition of the Bellare-Rogaway 3PKD model
Published 2007-01-01Subjects: Get full text
Article -
7
Provably secure certificateless aggregate signature scheme in wireless roaming authentication
Published 2017-07-01Subjects: “…provably secure…”
Get full text
Article -
8
Forward-secure ciphertext-policy attribute-based encryption scheme
Published 2014-07-01Subjects: Get full text
Article -
9
Efficient signcryption scheme based on Cocks’ identity cryptosystem
Published 2020-12-01Subjects: Get full text
Article -
10
Provable data possession scheme with authentication
Published 2016-10-01Subjects: Get full text
Article -
11
Research on password-authenticated key exchange protocol over lattices
Published 2022-12-01Subjects: Get full text
Article -
12
-
13
Provably secure rational delegation computation protocol
Published 2019-07-01Subjects: Get full text
Article -
14
Provably secure and efficient escrowable public key encryption schemes
Published 2014-07-01Subjects: Get full text
Article -
15
Post-quantum verifier-based three-party password authenticated key exchange protocol
Published 2022-04-01Subjects: Get full text
Article -
16
Password-based three-party authenticated key exchange protocol from lattices
Published 2018-11-01Subjects: Get full text
Article -
17
Edwards curves based security authentication protocol for mobile RFID systems
Published 2014-11-01Subjects: Get full text
Article -
18
Conditions for anonymity in some generic public-key encryption constructions
Published 2009-01-01Subjects: Get full text
Article -
19
Efficient and provably secure attribute-based online/offline encryption schemes
Published 2014-07-01Subjects: Get full text
Article -
20
Provable security signcryption scheme based on RLWE without trapdoor
Published 2020-06-01Subjects: Get full text
Article