The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase key-escrow (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1994-1996 (23) 1997 (41) 1998-2000 (16) 2001-2003 (15) 2004-2005 (22) 2006-2007 (32) 2008-2009 (27) 2010-2015 (17) 2016-2021 (16) 2022-2024 (12)
Publication types (Num. hits)
article(52) book(1) incollection(27) inproceedings(141)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 148 occurrences of 95 keywords

Results
Found 221 publication records. Showing 221 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
157Yvo Desmedt, Mike Burmester, Jennifer Seberry Equitability in Retroactive Data Confiscation versus Proactive Key Escrow. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF data confiscation, key escrow, RIP
125Adam L. Young, Moti Yung Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Auto-Recoverable Auto-Certifiable Cryptosystems, NIZK, software key escrow, escrow hierarchy, RSA, Public Key, Key Escrow, ElGamal
122E. Thomas Schubert, Sarah Mocas A Mechanized Logic for Secure Key Escrow Protocol Verification. Search on Bibsonomy TPHOLs The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
120JoongHyo Oh, KyungKeun Lee, Sang-Jae Moon How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Mediated identity-based encryption, Identity revocation, Mediated key agreement protocol, Key escrow
100Jin Wang, Xi Bai 0002, Jia Yu 0005, Daxing Li Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem. Search on Bibsonomy TAMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF key-insulated cryptosystem, bilinear pairings, Identity-based cryptography, key escrow, key exposure
97Mike Burmester, Yvo Desmedt, Jennifer Seberry Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically). Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF auctions with closed bids, time stamps, key escrow
94Kapali Viswanathan, Colin Boyd, Ed Dawson Strong Binding for Software Key Escrow. Search on Bibsonomy ICPP Workshops The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Software key escrow, proxy cryptography, traceability, compliance, enforceability
89Shingo Miyazaki, Ikuko Kuroda, Kouichi Sakurai Toward Fair International Key Escrow. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Key escrow/recovery system, Diffie-Hellman key distribution, Distributed Cryptography, Security policy, Trusted Third Party
88Yung-Cheng Lee, Chi-Sung Laih On the Key Recovery of the Key Escrow System. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Key Escrow System, social needs, criminal behavior, public cryptographic functions, encryption standard, cryptography, public key cryptography, protection, key recovery, user privacy
84Mark P. Hoyle, Chris J. Mitchell On Solutions to the Key Escrow Problem. Search on Bibsonomy State of the Art in Applied Cryptography The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
82Byung-Rae Lee, Kyung-Ah Chang, Tai-Yun Kim A Secure and Efficient Key Escrow Protocol for Mobile Communications. Search on Bibsonomy International Conference on Computational Science (1) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
82Xiaofeng Chen 0001, Fangguo Zhang, Divyan M. Konidala, Kwangjo Kim New ID-Based Threshold Signature Scheme from Bilinear Pairings. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF ID-based threshold signature, Bilinear pairings, Key escrow
71Edlyn Teske An Elliptic Curve Trapdoor System. Search on Bibsonomy J. Cryptol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Weil descent, Elliptic curve cryptography, Key escrow, Isogenies, Trapdoor functions
70Eric R. Verheul, Henk C. A. van Tilborg Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals. Search on Bibsonomy EUROCRYPT The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Traceable ElGamal, Key Recovery, Key Escrow, ElGamal
70Joe Kilian, Frank Thomson Leighton Fair Cryptosystems, Revisited: A Rigorous Approach to Key-Escrow (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
68Jeeyeon Kim, Seungjoo Kim, Hyunjo Kwon, Sungjae Lee, Sangjoon Park, Dongho Won Forward-Secure Commercial Key Escrow Systems. Search on Bibsonomy WETICE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
67Kapali Viswanathan, Colin Boyd, Ed Dawson Publicly Verifiable Key Escrow with Limited Time Span. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
67Joe Kilian, Erez Petrank Identity Escrow. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
63Adam L. Young, Moti Yung Auto-recoverable Auto-certifiable Cryptosystems (A Survey). Search on Bibsonomy CQRE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
62Adam L. Young, Moti Yung The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone? Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Cryptanalytic attacks, Private key, applied systems, design and manufacturing of cryptographic devices and software, auto-escrowing keys, software, RSA, randomness, hardware, Public Key, pseudorandomness, Kerberos, key escrow, DSA, ElGamal, subliminal channels, Capstone
60Haeryong Park, Hak Soo Ju, Kilsoo Chun, Jaeil Lee, Seungho Ahn, Bongnam Noh The Algorithm to Enhance the Security of Multi-Agent in Distributed Computing Environment. Search on Bibsonomy ICPADS (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ID-based threshold decryption(ID-ThD), Dynamic group management, Wireless network, Key escrow
58Mengbo Hou, Qiuliang Xu, Tao Ban Perfect Forward Secure Two-Party Key Agreement Protocol with Key Escrow. Search on Bibsonomy IIH-MSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF key control, identity-based encryption, key escrow, authenticated key agreement, perfect forward secrecy
57Florian Hess Efficient Identity Based Signature Schemes Based on Pairings. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Tate pairing, key escrow, Identity based signatures, Weil pairing
57Detlef Hühnlein, Michael J. Jacobson Jr., Sachar Paulus, Tsuyoshi Takagi A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF imaginary quadratic order, trapdoor decryption, factorization, Public key cryptosystem, key escrow
55Yong-Ho Lee, Im-Yeong Lee, Hyung-Woo Lee New Identity Escrow Scheme for Anonymity Authentication. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
52Yair Frankel, Moti Yung Escrow Encryption Systems Visited: Attacks, Analysis and Designs. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
49Juan Manuel González Nieto, Kapali Viswanathan, Colin Boyd, Andrew J. Clark, Ed Dawson Key recovery for the commercial environment. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Commercial key recovery, Software key recovery, Key management, Key escrow
49Adam L. Young, Moti Yung Auto-Recoverable Auto-Certifiable Cryptosystems. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
47Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee 0001, Jongin Lim 0001, Kilsoo Chun Efficient Revocation of Security Capability in Certificateless Public Key Cryptography. Search on Bibsonomy KES (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
46Barbara C. Davis, Tatu Ylönen Working Group Report on Internet/Intranet Security. Search on Bibsonomy WETICE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF intranet security, key backup, security implementation costs, security functionality, fault tolerance, Internet, enterprises, secure communications, Internet security, data protection, information infrastructure, key recovery, key escrow, law enforcement, redundant paths, data value
44Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF key issuing, bilinear pairings, key escrow, secure channel, ID-based cryptosystems
43Lars R. Knudsen, Torben P. Pedersen On the Difficulty of Software Key Escrow. Search on Bibsonomy EUROCRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
43Eiichiro Fujisaki, Tatsuaki Okamoto A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
41Marc Joye RSA Moduli with a Predetermined Portion: Techniques and Applications. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RSA-type cryptosystems, RSA moduli, RSA key lengths, diminished-radix moduli, key transport, key storage, key transmission, tamper-resistant devices, smart cards, key escrow, key generation, kleptography, setup, key compression
41Yvo Desmedt, Yongge Wang Efficient Zero-Knowledge Proofs for Some Practical Graph Problems. Search on Bibsonomy SCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF complexity, graph theory, secret sharing, Zero-knowledge, key-escrow
40Yvo Desmedt Securing Traceability of Ciphertexts - Towards a Secure Software Key Escrow System (Extended Abstract). Search on Bibsonomy EUROCRYPT The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
40Arjen K. Lenstra, Peter Winkler 0001, Yacov Yacobi A Key Escrow System with Warrant Bounds. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
39Yahya Y. Al-Salqan Cryptographic Key Recovery. Search on Bibsonomy FTDCS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
38Saeran Kwon, Sang-Ho Lee Identity-Based Key Issuing Without Secure Channel in a Broad Area. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37Vincent Omollo Nyangaresi, Zaid Ameen Abduljabbar, Ismail Yaqub Maolood, Mustafa A. Al Sibahee, Junchao Ma, Abdulla J. Y. Aldarwish Transient Session Key Derivation Protocol for Key Escrow Prevention in Public Key Infrastructure. Search on Bibsonomy IoECon The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
37Libo He, Chen Yuan 0002, Hu Xiong, Zhiguang Qin Certificateless Key Insulated Encryption: Cryptographic Primitive for Achieving Key-escrow free and Key-exposure Resilience. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
37Libo He, Chen Yuan 0002, Hu Xiong, Zhiguang Qin Certificateless Key-Insulated Encryption: Cryptographic Primitive for Achieving Key-Escrow Free and Key-Exposure Resilience. Search on Bibsonomy BigCom The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
35Sherman S. M. Chow Removing Escrow from Identity-Based Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Shanqing Guo, Chunhua Zhang Identity-based Broadcast Encryption Scheme with Untrusted PKG. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Dae Hyun Yum, Pil Joong Lee Generic Construction of Certificateless Signature. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF public-key signature, identity-based signature, Certificateless signature
33Yang Lu 0001, Jiguo Li 0001 Forward-Secure Certificate-Based Encryption. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
33Dae Hyun Yum, Pil Joong Lee Identity-Based Cryptography in Public Key Management. Search on Bibsonomy EuroPKI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
32Feng Cao, Zhenfu Cao, Licheng Wang An Improvement of an Identity-Based Key Issuing Protocol. Search on Bibsonomy IMSCCS (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Saeran Kwon, Sang-Ho Lee Security Analysis and Improvement for Key Issuing Schemes in ID-Based Cryptography. Search on Bibsonomy TrustBus The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Dae Hyun Yum, Pil Joong Lee Generic Construction of Certificateless Encryption. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
31Shamsher Ullah, Muhammad Tanveer Hussain, Mahwish Yousaf QuSigS: A quantum Signcryption scheme to recover key escrow problem and key revocation problem in cloud computing. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
31K. Sowjanya, Mou Dasgupta, Sangram Ray A lightweight key management scheme for key-escrow-free ECC-based CP-ABE for IoT healthcare systems. Search on Bibsonomy J. Syst. Archit. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
31Zhen Wang 0011, Zhaofeng Ma, Shoushan Luo, Hongmin Gao 0002 Key Escrow Protocol Based on a Tripartite Authenticated Key Agreement and Threshold Cryptography. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
31Quanyun Wei, Fang Qi, Zhe Tang Remove key escrow from the BF and Gentry identity-based encryption with non-interactive key generation. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31Gang Yu, Xiaoxiao Ma, Zhenfu Cao, Weihua Zhu, Junjie Zeng Accountable Multi-authority Ciphertext-Policy Attribute-Based Encryption Without Key Escrow and Key Abuse. Search on Bibsonomy CSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
31Jingqiang Lin, Wen Tao Zhu, Qiongxiao Wang, Nan Zhang, Jiwu Jing, Neng Gao RIKE+ : using revocable identities to support key escrow in public key infrastructures with flexibility. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
31Mengbo Hou, Qiuliang Xu A Secure ID-Based Explicit Authenticated Key Agreement Protocol without Key Escrow. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
31Hal Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier The risks of key recovery, key escrow, and trusted third-party encryption. Search on Bibsonomy World Wide Web J. The full citation details ... 1997 DBLP  BibTeX  RDF
31James Nechvatal A Public-Key - Based Key Escrow System. Search on Bibsonomy J. Syst. Softw. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
30Bo Zhang 0020, Qiuliang Xu Certificateless Proxy Blind Signature Scheme from Bilinear Pairings. Search on Bibsonomy WKDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Jian Liao, Junfang Xiao, Yinghao Qi, Peiwei Huang, Mentian Rong ID-Based Signature Scheme Without Trusted PKG. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Birgit Pfitzmann, Michael Waidner How to Break Fraud-Detectable Key Recovery. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
30Ross J. Anderson, Michael Roe The GCHQ Protocol and Its Problems. Search on Bibsonomy EUROCRYPT The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
28M. Choudary Gorantla, Ashutosh Saxena An Efficient Certificateless Signature Scheme. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Ashutosh Saxena Threshold SKI Protocol for ID-based Cryptosystems. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF secure key issuing, ID-based cryptography
27Theodore Diament, Homin K. Lee, Angelos D. Keromytis, Moti Yung The dual receiver cryptosystem and its applications. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF useful secure computation, digital signature, elliptic curves, public key, key escrow, puzzles, pairing-based cryptography
26Licheng Wang, Zhenfu Cao, Feng Cao, Haifeng Qian Cryptanalysis and Improvement on An ID-Based Key Issuing Protocol. Search on Bibsonomy IMSCCS (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Xu He, Lixiang Li 0001, Haipeng Peng A Key Escrow-Free KP-ABE Scheme and Its Application in Standalone Authentication in IoT. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
26Tongda Liu, Zekun Li, Yanyan Ji, Jinyong Chang Efficient Key-Escrow-Free and Vehicle-Revocable Data Sharing Protocol for Vehicular Ad Hoc Network. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
26Meijuan Huang, Yutian Liu, Bo Yang 0003, Yanqi Zhao, Mingrui Zhang Efficient Revocable Attribute-Based Encryption with Data Integrity and Key Escrow-Free. Search on Bibsonomy Inf. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
26 Retraction Note: Enhanced post-quantum key escrow system for supervised data conflict of interest based on consortium blockchain. Search on Bibsonomy J. Comb. Optim. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
26Axin Xiang, Hongfeng Gao, Youliang Tian, Liang Wan DBKEM-AACS: a distributed key escrow model in blockchain with anonymous authentication and committee selection. Search on Bibsonomy Sci. China Inf. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Mahender Kumar An Approach to Remove Key Escrow Problem in ID-Based Encryption From Pairing. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26 Enhanced post-quantum key escrow system for supervised data conflict of interest based on consortium blockchain. Search on Bibsonomy J. Comb. Optim. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Yang Yang, Bingyu Li, Shihong Xiong, Bo Qin, Yan Zhu, Haibin Zheng, Qianhong Wu IKE: Threshold Key Escrow Service with Intermediary Encryption. Search on Bibsonomy ICA3PP (3) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Ruyuan Zhang, Jiguo Li 0001, Yang Lu 0001, Jinguang Han, Yichen Zhang 0003 Key escrow-free attribute based encryption with user revocation. Search on Bibsonomy Inf. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Giuseppe Ungaro, Francesco Ricchitelli, Ingrid Huso, Giuseppe Piro, Gennaro Boggia Design and Implementation of a Lawful Interception Architecture for B5G Systems Based on Key Escrow. Search on Bibsonomy CSCN The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Soheyla ZakeriKia, Rahman Hajian, Seyed Hossein Erfani, Amir Masoud Rahmani Robust and anonymous handover authentication scheme without key escrow problem in vehicular sensor networks. Search on Bibsonomy Wirel. Networks The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
26Xiaowen Cai, Wenjing Cheng, Minghui Zhang, Chen Qian, Zhengwei Ren, Shiwei Xu, Jianying Zhou 0001 Post-quantum Key Escrow for Supervised Secret Data Sharing on Consortium Blockchain. Search on Bibsonomy CSS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
26Sungyong Cha, Seungsoo Baek, Seungjoo Kim Blockchain Based Sensitive Data Management by Using Key Escrow Encryption System From the Perspective of Supply Chain. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
26Umasankararao Varri, Syam Kumar Pasupuleti, K. V. Kadambari Key-Escrow Free Attribute-Based Multi-Keyword Search with Dynamic Policy Update in Cloud Computing. Search on Bibsonomy CCGRID The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
26Nyamsuren Vaanchig, Hu Xiong, Wei Chen, Zhiguang Qin Achieving Collaborative Cloud Data Storage by Key-Escrow-Free Multi-Authority CP-ABE Scheme with Dual-Revocation. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2018 DBLP  BibTeX  RDF
26Yang Chen, Qiaoyan Wen, Wenmin Li 0001, Hua Zhang 0001, Zhengping Jin Generic Construction of Outsourced Attribute-Based Encryption Without Key Escrow. Search on Bibsonomy IEEE Access The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Rihab Boussada, Mohamed Elhoucine Elhdhili, Leïla Azouz Saïdane Toward privacy preserving in IoT e-health systems: A key escrow identity-based encryption scheme. Search on Bibsonomy CCNC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Dan Liu, Shun Zhang 0002, Hong Zhong 0001, Runhua Shi, Yimin Wang An Efficient ID-based Online/Offline Signature Scheme without Key Escrow. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2017 DBLP  BibTeX  RDF
26Nazatul Haque Sultan, Ferdous Ahmed Barbhuiya, Nityananda Sarma A universal cloud user revocation scheme with key-escrow resistance for ciphertext-policy attribute-based access control. Search on Bibsonomy SIN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Yuanlong Li, Fang Qi, Zhe Tang An Efficient Hierarchical Identity-Based Encryption Scheme for the Key Escrow. Search on Bibsonomy SpaCCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Yongtao Wang, Xiaonan Liu, Lulu Liang, Weiduan Feng, Guang Yang Mitigating Key Escrow in Attribute-Based Encryption. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2015 DBLP  BibTeX  RDF
26Manik Lal Das Key-escrow free multi-signature scheme using bilinear pairings. Search on Bibsonomy Groups Complex. Cryptol. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Xing Zhang 0002, Cancan Jin, Zilong Wen, Qingni Shen, Yuejian Fang, Zhonghai Wu Attribute-Based Encryption Without Key Escrow. Search on Bibsonomy ICCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Peixin Chen, Xiaofeng Wang 0002, Baokang Zhao, Jinshu Su, Ilsun You Removing Key Escrow from the LW-HIBE Scheme. Search on Bibsonomy ICA3PP (Workshops and Symposiums) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Jianhong Zhang, Zhibin Sun An ID-Based Server-Aided Verification Short Signature Scheme Avoid Key Escrow. Search on Bibsonomy J. Inf. Sci. Eng. The full citation details ... 2013 DBLP  BibTeX  RDF
26Yan Zhu 0010, Di Ma, Shan-Biao Wang, Rong-Quan Feng Efficient Identity-Based Encryption without Pairings and Key Escrow for Mobile Devices. Search on Bibsonomy WASA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
26Nan Zhang, Jingqiang Lin, Jiwu Jing, Neng Gao RIKE: Using Revocable Identities to Support Key Escrow in PKIs. Search on Bibsonomy ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
26Mike Just Key Escrow. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Kyusuk Han, Chan Yeob Yeun, Taeshik Shon, Jong Hyuk Park, Kwangjo Kim A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication. Search on Bibsonomy Int. J. Commun. Syst. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Manik Lal Das A Key Escrow-Free Identity-Based Signature Scheme without using Secure Channel. Search on Bibsonomy Cryptologia The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Aymen Boudguiga, Maryline Laurent Key-escrow resistant ID-based authentication scheme for IEEE 802.11s mesh networks. Search on Bibsonomy WCNC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Matt Blaze Key escrow from a safe distance: looking back at the Clipper Chip. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Tsz Hon Yuen, Willy Susilo, Yi Mu 0001 How to construct identity-based signatures without the key escrow problem. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 221 (100 per page; Change: )
Pages: [1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license