|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 218 occurrences of 133 keywords
|
|
|
Results
Found 357 publication records. Showing 357 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
143 | Adam L. Young, Moti Yung |
Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
Auto-Recoverable Auto-Certifiable Cryptosystems, NIZK, software key escrow, escrow hierarchy, RSA, Public Key, Key Escrow, ElGamal |
129 | Yvo Desmedt, Mike Burmester, Jennifer Seberry |
Equitability in Retroactive Data Confiscation versus Proactive Key Escrow. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
data confiscation, key escrow, RIP |
122 | Stanislaw Jarecki, Vitaly Shmatikov |
Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme. |
EUROCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
109 | E. Thomas Schubert, Sarah Mocas |
A Mechanized Logic for Secure Key Escrow Protocol Verification. |
TPHOLs |
1995 |
DBLP DOI BibTeX RDF |
|
96 | Liuba Shrira, Hong Tian, Douglas B. Terry |
Exo-Leasing: Escrow Synchronization for Mobile Clients of Commodity Storage Servers. |
Middleware |
2008 |
DBLP DOI BibTeX RDF |
|
91 | JoongHyo Oh, KyungKeun Lee, Sang-Jae Moon |
How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes. |
ICISS |
2005 |
DBLP DOI BibTeX RDF |
Mediated identity-based encryption, Identity revocation, Mediated key agreement protocol, Key escrow |
91 | Jan Camenisch, Anna Lysyanskaya |
An Identity Escrow Scheme with Appointed Verifiers. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
formal model for group signatures, group signatures, privacy protection, Identity escrow |
84 | Stanislaw Jarecki, Vitaly Shmatikov |
Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure. |
Financial Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
84 | Joe Kilian, Erez Petrank |
Identity Escrow. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
|
84 | Yair Frankel, Moti Yung |
On Characterization of Escrow Encryption Schemes. |
ICALP |
1997 |
DBLP DOI BibTeX RDF |
|
78 | Kapali Viswanathan, Colin Boyd, Ed Dawson |
Strong Binding for Software Key Escrow. |
ICPP Workshops |
1999 |
DBLP DOI BibTeX RDF |
Software key escrow, proxy cryptography, traceability, compliance, enforceability |
78 | Mike Burmester, Yvo Desmedt, Jennifer Seberry |
Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically). |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
auctions with closed bids, time stamps, key escrow |
78 | Patrick E. O'Neil |
The Escrow Transactional Method. |
ACM Trans. Database Syst. |
1986 |
DBLP DOI BibTeX RDF |
Escrow |
71 | Yong-Ho Lee, Im-Yeong Lee, Hyung-Woo Lee |
New Identity Escrow Scheme for Anonymity Authentication. |
INDOCRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
71 | Byung-Rae Lee, Kyung-Ah Chang, Tai-Yun Kim |
A Secure and Efficient Key Escrow Protocol for Mobile Communications. |
International Conference on Computational Science (1) |
2001 |
DBLP DOI BibTeX RDF |
|
71 | Mark P. Hoyle, Chris J. Mitchell |
On Solutions to the Key Escrow Problem. |
State of the Art in Applied Cryptography |
1997 |
DBLP DOI BibTeX RDF |
|
71 | Yair Frankel, Moti Yung |
Escrow Encryption Systems Visited: Attacks, Analysis and Designs. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
71 | Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik |
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
revocable anonymity, coalition-resistance, provable security, strong RSA assumption, identity escrow, Group signature schemes |
65 | Jin Wang, Xi Bai 0002, Jia Yu 0005, Daxing Li |
Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem. |
TAMC |
2007 |
DBLP DOI BibTeX RDF |
key-insulated cryptosystem, bilinear pairings, Identity-based cryptography, key escrow, key exposure |
65 | Noburou Taniguchi, Koji Chida, Osamu Shionoiri, Atsushi Kanai |
DECIDE: a scheme for decentralized identity escrow. |
Digital Identity Management |
2005 |
DBLP DOI BibTeX RDF |
fair blind signature, online discussion community, school networking, whistleblowing, trust, anonymity, identity, pseudonymity, identity escrow |
65 | Shingo Miyazaki, Ikuko Kuroda, Kouichi Sakurai |
Toward Fair International Key Escrow. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
Key escrow/recovery system, Diffie-Hellman key distribution, Distributed Cryptography, Security policy, Trusted Third Party |
65 | Yung-Cheng Lee, Chi-Sung Laih |
On the Key Recovery of the Key Escrow System. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
Key Escrow System, social needs, criminal behavior, public cryptographic functions, encryption standard, cryptography, public key cryptography, protection, key recovery, user privacy |
58 | Aybek Mukhamedov, Mark Dermot Ryan |
On Anonymity with Identity Escrow. |
Formal Aspects in Security and Trust |
2005 |
DBLP DOI BibTeX RDF |
|
58 | Jeeyeon Kim, Seungjoo Kim, Hyunjo Kwon, Sungjae Lee, Sangjoon Park, Dongho Won |
Forward-Secure Commercial Key Escrow Systems. |
WETICE |
2001 |
DBLP DOI BibTeX RDF |
|
58 | Kapali Viswanathan, Colin Boyd, Ed Dawson |
Publicly Verifiable Key Escrow with Limited Time Span. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
|
58 | Joe Kilian, Frank Thomson Leighton |
Fair Cryptosystems, Revisited: A Rigorous Approach to Key-Escrow (Extended Abstract). |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
58 | Edlyn Teske |
An Elliptic Curve Trapdoor System. |
J. Cryptol. |
2006 |
DBLP DOI BibTeX RDF |
Weil descent, Elliptic curve cryptography, Key escrow, Isogenies, Trapdoor functions |
58 | Lan Nguyen |
Accumulators from Bilinear Pairings and Applications. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
membership revocation, privacy, anonymity, group signatures, ring signatures, ID-based, identity escrow, Dynamic accumulators |
58 | Xiaofeng Chen 0001, Fangguo Zhang, Divyan M. Konidala, Kwangjo Kim |
New ID-Based Threshold Signature Scheme from Bilinear Pairings. |
INDOCRYPT |
2004 |
DBLP DOI BibTeX RDF |
ID-based threshold signature, Bilinear pairings, Key escrow |
53 | Eric R. Verheul, Henk C. A. van Tilborg |
Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals. |
EUROCRYPT |
1997 |
DBLP DOI BibTeX RDF |
Traceable ElGamal, Key Recovery, Key Escrow, ElGamal |
51 | Adam L. Young, Moti Yung |
Auto-recoverable Auto-certifiable Cryptosystems (A Survey). |
CQRE |
1999 |
DBLP DOI BibTeX RDF |
|
45 | Sherman S. M. Chow |
Removing Escrow from Identity-Based Encryption. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
45 | Chen Huang 0003, Benxiong Huang, Yijun Mo, Jianhua Ma |
SRPTES: A Secure Routing Protocol Based on Token Escrow Set for Ad Hoc Networks. |
AINA |
2008 |
DBLP DOI BibTeX RDF |
Security, Routing, Ad hoc, Token |
45 | Bill G. Horne, Benny Pinkas, Tomas Sander |
Escrow services and incentives in peer-to-peer networks. |
EC |
2001 |
DBLP DOI BibTeX RDF |
|
45 | Narayanan Krishnakumar, Ravi Jain |
Escrow techniques for mobile sales and inventory applications. |
Wirel. Networks |
1997 |
DBLP DOI BibTeX RDF |
|
45 | Haeryong Park, Hak Soo Ju, Kilsoo Chun, Jaeil Lee, Seungho Ahn, Bongnam Noh |
The Algorithm to Enhance the Security of Multi-Agent in Distributed Computing Environment. |
ICPADS (2) |
2006 |
DBLP DOI BibTeX RDF |
ID-based threshold decryption(ID-ThD), Dynamic group management, Wireless network, Key escrow |
45 | Florian Hess |
Efficient Identity Based Signature Schemes Based on Pairings. |
Selected Areas in Cryptography |
2002 |
DBLP DOI BibTeX RDF |
Tate pairing, key escrow, Identity based signatures, Weil pairing |
45 | Jan Camenisch, Anna Lysyanskaya |
Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
anonymity, group signatures, certificate revocation, credential systems, identity escrow, Dynamic accumulators |
45 | Detlef Hühnlein, Michael J. Jacobson Jr., Sachar Paulus, Tsuyoshi Takagi |
A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption. |
EUROCRYPT |
1998 |
DBLP DOI BibTeX RDF |
imaginary quadratic order, trapdoor decryption, factorization, Public key cryptosystem, key escrow |
45 | Adam L. Young, Moti Yung |
The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone? |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
Cryptanalytic attacks, Private key, applied systems, design and manufacturing of cryptographic devices and software, auto-escrowing keys, software, RSA, randomness, hardware, Public Key, pseudorandomness, Kerberos, key escrow, DSA, ElGamal, subliminal channels, Capstone |
40 | JongHo Ryu, JungChan Na |
Information-Revealing with Distributed Escrow Authorities. |
NCM |
2009 |
DBLP DOI BibTeX RDF |
Information-Revealing, Distributed Escrow |
40 | Mengbo Hou, Qiuliang Xu, Tao Ban |
Perfect Forward Secure Two-Party Key Agreement Protocol with Key Escrow. |
IIH-MSP |
2009 |
DBLP DOI BibTeX RDF |
key control, identity-based encryption, key escrow, authenticated key agreement, perfect forward secrecy |
38 | Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee 0001, Jongin Lim 0001, Kilsoo Chun |
Efficient Revocation of Security Capability in Certificateless Public Key Cryptography. |
KES (2) |
2005 |
DBLP DOI BibTeX RDF |
|
38 | Eiichiro Fujisaki, Tatsuaki Okamoto |
A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications. |
EUROCRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
38 | Adam L. Young, Moti Yung |
Auto-Recoverable Auto-Certifiable Cryptosystems. |
EUROCRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
33 | Shengbao Wang, Zhenfu Cao, ZhaoHui Cheng, Kim-Kwang Raymond Choo |
Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode. |
Sci. China Ser. F Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
modular security proof, provable security, bilinear pairing, authenticated key agreement, perfect forward secrecy |
33 | Aybek Mukhamedov, Mark Dermot Ryan |
Anonymity Protocol with Identity Escrow and Analysis in the Applied n-Calculus. |
TGC |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Keiichi Hirota, Noboru Sonehara |
Simple and Secure Authentication Escrow for Rights Trading Protocol. |
SAINT Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Sattam S. Al-Riyami, John Malone-Lee, Nigel P. Smart |
Escrow-free encryption supporting cryptographic workflow. |
Int. J. Inf. Sec. |
2006 |
DBLP DOI BibTeX RDF |
Workflow, Pairings, Identity based encryption |
33 | Volker Siegel |
Software-Escrow. |
Inform. Spektrum |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Martin Schaffer, Peter Schartner |
Key Escrow with Tree-Based Access Structure. |
MMM-ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
33 | George Danezis |
An Anonymous Auction Protocol Using "Money Escrow" (Transcript of Discussion). |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
33 | Lars R. Knudsen, Torben P. Pedersen |
On the Difficulty of Software Key Escrow. |
EUROCRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
33 | Yvo Desmedt |
Securing Traceability of Ciphertexts - Towards a Secure Software Key Escrow System (Extended Abstract). |
EUROCRYPT |
1995 |
DBLP DOI BibTeX RDF |
|
33 | Silvio Micali, Ray Sidney |
A Simple Method for Generating and Sharing Pseudo-Random Functions, with Applications to Clipper-like Escrow Systems. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
33 | Arjen K. Lenstra, Peter Winkler 0001, Yacov Yacobi |
A Key Escrow System with Warrant Bounds. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
33 | Thomas Beth, Hans-Joachim Knobloch, Marcus Otten, Gustavus J. Simmons, Peer Wichmann |
Towards Acceptable Key Escrow Systems. |
CCS |
1994 |
DBLP DOI BibTeX RDF |
|
33 | Marc Joye |
RSA Moduli with a Predetermined Portion: Techniques and Applications. |
ISPEC |
2008 |
DBLP DOI BibTeX RDF |
RSA-type cryptosystems, RSA moduli, RSA key lengths, diminished-radix moduli, key transport, key storage, key transmission, tamper-resistant devices, smart cards, key escrow, key generation, kleptography, setup, key compression |
33 | Youngho Park 0004, Jung-Hwa Shin, Kyung Hyune Rhee |
Design of a Secure Digital Contents Delivery System in P2P Networks. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
Escrow Service, Key Issuing, P2P, Contents Distribution |
33 | Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati |
An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
key issuing, bilinear pairings, key escrow, secure channel, ID-based cryptosystems |
33 | Juan Manuel González Nieto, Kapali Viswanathan, Colin Boyd, Andrew J. Clark, Ed Dawson |
Key recovery for the commercial environment. |
Int. J. Inf. Sec. |
2002 |
DBLP DOI BibTeX RDF |
Commercial key recovery, Software key recovery, Key management, Key escrow |
33 | Yvo Desmedt, Yongge Wang |
Efficient Zero-Knowledge Proofs for Some Practical Graph Problems. |
SCN |
2002 |
DBLP DOI BibTeX RDF |
complexity, graph theory, secret sharing, Zero-knowledge, key-escrow |
33 | Daisuke Hirakiuchi, Kouichi Sakurai |
English vs. Sealed Bid in Anonymous Electronic Auction Protocols. |
WETICE |
2001 |
DBLP DOI BibTeX RDF |
English auction, anonymity, group signatures, sealed bid auction, electronic auction, identity escrow |
33 | Birgit Pfitzmann, Ahmad-Reza Sadeghi |
Self-Escrowed Cash against User Blackmailing. |
Financial Cryptography |
2000 |
DBLP DOI BibTeX RDF |
Escrowed Cash, Fair Cash, Digital Coin, Blackmailing, Self-Escrow, Anonymity Revocation |
33 | Barbara C. Davis, Tatu Ylönen |
Working Group Report on Internet/Intranet Security. |
WETICE |
1997 |
DBLP DOI BibTeX RDF |
intranet security, key backup, security implementation costs, security functionality, fault tolerance, Internet, enterprises, secure communications, Internet security, data protection, information infrastructure, key recovery, key escrow, law enforcement, redundant paths, data value |
25 | Yang Lu 0001, Jiguo Li 0001 |
Forward-Secure Certificate-Based Encryption. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Bo Zhang 0020, Qiuliang Xu |
Certificateless Proxy Blind Signature Scheme from Bilinear Pairings. |
WKDD |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Shanqing Guo, Chunhua Zhang |
Identity-based Broadcast Encryption Scheme with Untrusted PKG. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Saeran Kwon, Sang-Ho Lee |
Identity-Based Key Issuing Without Secure Channel in a Broad Area. |
WISA |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Feng Cao, Zhenfu Cao, Licheng Wang |
An Improvement of an Identity-Based Key Issuing Protocol. |
IMSCCS (2) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Saeran Kwon, Sang-Ho Lee |
Security Analysis and Improvement for Key Issuing Schemes in ID-Based Cryptography. |
TrustBus |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Jian Liao, Junfang Xiao, Yinghao Qi, Peiwei Huang, Mentian Rong |
ID-Based Signature Scheme Without Trusted PKG. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
25 | M. Choudary Gorantla, Ashutosh Saxena |
An Efficient Certificateless Signature Scheme. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Dae Hyun Yum, Pil Joong Lee |
Identity-Based Cryptography in Public Key Management. |
EuroPKI |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Dae Hyun Yum, Pil Joong Lee |
Generic Construction of Certificateless Signature. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
public-key signature, identity-based signature, Certificateless signature |
25 | N. Boris Margolin, Matthew K. Wright, Brian Neil Levine |
Analysis of an incentives-based secrets protection system. |
Digital Rights Management Workshop |
2004 |
DBLP DOI BibTeX RDF |
economics, digital rights management, incentives |
25 | Dae Hyun Yum, Pil Joong Lee |
Generic Construction of Certificateless Encryption. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Stanislaw Jarecki, Patrick Lincoln, Vitaly Shmatikov |
Negotiated Privacy: (Extended Abstract). |
ISSS |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Birgit Pfitzmann, Michael Waidner |
How to Break Fraud-Detectable Key Recovery. |
ACM SIGOPS Oper. Syst. Rev. |
1998 |
DBLP DOI BibTeX RDF |
|
25 | Ross J. Anderson, Michael Roe |
The GCHQ Protocol and Its Problems. |
EUROCRYPT |
1997 |
DBLP DOI BibTeX RDF |
|
25 | Yahya Y. Al-Salqan |
Cryptographic Key Recovery. |
FTDCS |
1997 |
DBLP DOI BibTeX RDF |
|
20 | Xu He, Lixiang Li 0001, Haipeng Peng |
A Key Escrow-Free KP-ABE Scheme and Its Application in Standalone Authentication in IoT. |
IEEE Internet Things J. |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Tongda Liu, Zekun Li, Yanyan Ji, Jinyong Chang |
Efficient Key-Escrow-Free and Vehicle-Revocable Data Sharing Protocol for Vehicular Ad Hoc Network. |
IEEE Internet Things J. |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Meijuan Huang, Yutian Liu, Bo Yang 0003, Yanqi Zhao, Mingrui Zhang |
Efficient Revocable Attribute-Based Encryption with Data Integrity and Key Escrow-Free. |
Inf. |
2024 |
DBLP DOI BibTeX RDF |
|
20 | |
Retraction Note: Enhanced post-quantum key escrow system for supervised data conflict of interest based on consortium blockchain. |
J. Comb. Optim. |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Caihui Lan, Liangliang Liu, Caifen Wang, Haifeng Li 0009 |
An efficient and revocable attribute-based data sharing scheme with rich expression and escrow freedom. |
Inf. Sci. |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Yuyan Guo, Zhenhua Lu, Hui Ge, Jiguo Li 0001 |
Revocable Blockchain-Aided Attribute-Based Encryption With Escrow-Free in Cloud Storage. |
IEEE Trans. Computers |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Axin Xiang, Hongfeng Gao, Youliang Tian, Liang Wan |
DBKEM-AACS: a distributed key escrow model in blockchain with anonymous authentication and committee selection. |
Sci. China Inf. Sci. |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Zhiru Zhu, Raul Castro Fernandez |
Making Differential Privacy Easier to Use for Data Controllers and Data Analysts using a Privacy Risk Indicator and an Escrow-Based Platform. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Siyuan Xia, Zhiru Zhu, Chris Zhu, Jinjin Zhao, Kyle Chard, Aaron J. Elmore, Ian T. Foster, Michael J. Franklin, Sanjay Krishnan, Raul Castro Fernandez |
Data Station: Delegated, Trustworthy, and Auditable Computation to Enable Data-Sharing Consortia with a Data Escrow. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Mahender Kumar |
An Approach to Remove Key Escrow Problem in ID-Based Encryption From Pairing. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Christian Weitzel |
Remmertz/Kast (Hrsg.): Digital Escrow. |
Comput. und Recht |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Guido Aßhoff |
Software Escrow Vertragsgestaltung zwischen Compliance-Anforderungen und Datenschutz. |
Comput. und Recht |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal |
Shield: Secure Allegation Escrow System with Stronger Guarantees. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
20 | Girraj Kumar Verma, Prosanta Gope, Neetesh Saxena, Neeraj Kumar 0001 |
CB-DA: Lightweight and Escrow-Free Certificate-Based Data Aggregation for Smart Grid. |
IEEE Trans. Dependable Secur. Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
20 | |
Enhanced post-quantum key escrow system for supervised data conflict of interest based on consortium blockchain. |
J. Comb. Optim. |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal |
Shield: Secure Allegation Escrow System with Stronger Guarantees. |
WWW |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Easwar Vivek Mangipudi, Donghang Lu, Alexandros Psomas 0001, Aniket Kate |
Collusion-Deterrent Threshold Information Escrow. |
CSF |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Sourabh Bhaskar, Keyur Parmar, Devesh C. Jinwala |
Escrow and Pairing Free CP-ABE Scheme with Forward and Backward Secrecy for Healthcare Internet of Things. |
ICISS |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Ryosuke Abe, Seiyo Kurita, Mariko Kobayashi, Shigeya Suzuki |
Mitigation of Seller and Buyer's Dilemma with Transaction History and Escrow. |
AINTEC |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 357 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ >>] |
|