|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 148 occurrences of 95 keywords
|
|
|
Results
Found 221 publication records. Showing 221 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
157 | Yvo Desmedt, Mike Burmester, Jennifer Seberry |
Equitability in Retroactive Data Confiscation versus Proactive Key Escrow. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
data confiscation, key escrow, RIP |
125 | Adam L. Young, Moti Yung |
Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
Auto-Recoverable Auto-Certifiable Cryptosystems, NIZK, software key escrow, escrow hierarchy, RSA, Public Key, Key Escrow, ElGamal |
122 | E. Thomas Schubert, Sarah Mocas |
A Mechanized Logic for Secure Key Escrow Protocol Verification. |
TPHOLs |
1995 |
DBLP DOI BibTeX RDF |
|
120 | JoongHyo Oh, KyungKeun Lee, Sang-Jae Moon |
How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes. |
ICISS |
2005 |
DBLP DOI BibTeX RDF |
Mediated identity-based encryption, Identity revocation, Mediated key agreement protocol, Key escrow |
100 | Jin Wang, Xi Bai 0002, Jia Yu 0005, Daxing Li |
Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem. |
TAMC |
2007 |
DBLP DOI BibTeX RDF |
key-insulated cryptosystem, bilinear pairings, Identity-based cryptography, key escrow, key exposure |
97 | Mike Burmester, Yvo Desmedt, Jennifer Seberry |
Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically). |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
auctions with closed bids, time stamps, key escrow |
94 | Kapali Viswanathan, Colin Boyd, Ed Dawson |
Strong Binding for Software Key Escrow. |
ICPP Workshops |
1999 |
DBLP DOI BibTeX RDF |
Software key escrow, proxy cryptography, traceability, compliance, enforceability |
89 | Shingo Miyazaki, Ikuko Kuroda, Kouichi Sakurai |
Toward Fair International Key Escrow. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
Key escrow/recovery system, Diffie-Hellman key distribution, Distributed Cryptography, Security policy, Trusted Third Party |
88 | Yung-Cheng Lee, Chi-Sung Laih |
On the Key Recovery of the Key Escrow System. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
Key Escrow System, social needs, criminal behavior, public cryptographic functions, encryption standard, cryptography, public key cryptography, protection, key recovery, user privacy |
84 | Mark P. Hoyle, Chris J. Mitchell |
On Solutions to the Key Escrow Problem. |
State of the Art in Applied Cryptography |
1997 |
DBLP DOI BibTeX RDF |
|
82 | Byung-Rae Lee, Kyung-Ah Chang, Tai-Yun Kim |
A Secure and Efficient Key Escrow Protocol for Mobile Communications. |
International Conference on Computational Science (1) |
2001 |
DBLP DOI BibTeX RDF |
|
82 | Xiaofeng Chen 0001, Fangguo Zhang, Divyan M. Konidala, Kwangjo Kim |
New ID-Based Threshold Signature Scheme from Bilinear Pairings. |
INDOCRYPT |
2004 |
DBLP DOI BibTeX RDF |
ID-based threshold signature, Bilinear pairings, Key escrow |
71 | Edlyn Teske |
An Elliptic Curve Trapdoor System. |
J. Cryptol. |
2006 |
DBLP DOI BibTeX RDF |
Weil descent, Elliptic curve cryptography, Key escrow, Isogenies, Trapdoor functions |
70 | Eric R. Verheul, Henk C. A. van Tilborg |
Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals. |
EUROCRYPT |
1997 |
DBLP DOI BibTeX RDF |
Traceable ElGamal, Key Recovery, Key Escrow, ElGamal |
70 | Joe Kilian, Frank Thomson Leighton |
Fair Cryptosystems, Revisited: A Rigorous Approach to Key-Escrow (Extended Abstract). |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
68 | Jeeyeon Kim, Seungjoo Kim, Hyunjo Kwon, Sungjae Lee, Sangjoon Park, Dongho Won |
Forward-Secure Commercial Key Escrow Systems. |
WETICE |
2001 |
DBLP DOI BibTeX RDF |
|
67 | Kapali Viswanathan, Colin Boyd, Ed Dawson |
Publicly Verifiable Key Escrow with Limited Time Span. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
|
67 | Joe Kilian, Erez Petrank |
Identity Escrow. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
|
63 | Adam L. Young, Moti Yung |
Auto-recoverable Auto-certifiable Cryptosystems (A Survey). |
CQRE |
1999 |
DBLP DOI BibTeX RDF |
|
62 | Adam L. Young, Moti Yung |
The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone? |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
Cryptanalytic attacks, Private key, applied systems, design and manufacturing of cryptographic devices and software, auto-escrowing keys, software, RSA, randomness, hardware, Public Key, pseudorandomness, Kerberos, key escrow, DSA, ElGamal, subliminal channels, Capstone |
60 | Haeryong Park, Hak Soo Ju, Kilsoo Chun, Jaeil Lee, Seungho Ahn, Bongnam Noh |
The Algorithm to Enhance the Security of Multi-Agent in Distributed Computing Environment. |
ICPADS (2) |
2006 |
DBLP DOI BibTeX RDF |
ID-based threshold decryption(ID-ThD), Dynamic group management, Wireless network, Key escrow |
58 | Mengbo Hou, Qiuliang Xu, Tao Ban |
Perfect Forward Secure Two-Party Key Agreement Protocol with Key Escrow. |
IIH-MSP |
2009 |
DBLP DOI BibTeX RDF |
key control, identity-based encryption, key escrow, authenticated key agreement, perfect forward secrecy |
57 | Florian Hess |
Efficient Identity Based Signature Schemes Based on Pairings. |
Selected Areas in Cryptography |
2002 |
DBLP DOI BibTeX RDF |
Tate pairing, key escrow, Identity based signatures, Weil pairing |
57 | Detlef Hühnlein, Michael J. Jacobson Jr., Sachar Paulus, Tsuyoshi Takagi |
A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption. |
EUROCRYPT |
1998 |
DBLP DOI BibTeX RDF |
imaginary quadratic order, trapdoor decryption, factorization, Public key cryptosystem, key escrow |
55 | Yong-Ho Lee, Im-Yeong Lee, Hyung-Woo Lee |
New Identity Escrow Scheme for Anonymity Authentication. |
INDOCRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
52 | Yair Frankel, Moti Yung |
Escrow Encryption Systems Visited: Attacks, Analysis and Designs. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
49 | Juan Manuel González Nieto, Kapali Viswanathan, Colin Boyd, Andrew J. Clark, Ed Dawson |
Key recovery for the commercial environment. |
Int. J. Inf. Sec. |
2002 |
DBLP DOI BibTeX RDF |
Commercial key recovery, Software key recovery, Key management, Key escrow |
49 | Adam L. Young, Moti Yung |
Auto-Recoverable Auto-Certifiable Cryptosystems. |
EUROCRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
47 | Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee 0001, Jongin Lim 0001, Kilsoo Chun |
Efficient Revocation of Security Capability in Certificateless Public Key Cryptography. |
KES (2) |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Barbara C. Davis, Tatu Ylönen |
Working Group Report on Internet/Intranet Security. |
WETICE |
1997 |
DBLP DOI BibTeX RDF |
intranet security, key backup, security implementation costs, security functionality, fault tolerance, Internet, enterprises, secure communications, Internet security, data protection, information infrastructure, key recovery, key escrow, law enforcement, redundant paths, data value |
44 | Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati |
An Efficient Secure Key Issuing Protocol in ID-Based Cryptosystems. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
key issuing, bilinear pairings, key escrow, secure channel, ID-based cryptosystems |
43 | Lars R. Knudsen, Torben P. Pedersen |
On the Difficulty of Software Key Escrow. |
EUROCRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
43 | Eiichiro Fujisaki, Tatsuaki Okamoto |
A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications. |
EUROCRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
41 | Marc Joye |
RSA Moduli with a Predetermined Portion: Techniques and Applications. |
ISPEC |
2008 |
DBLP DOI BibTeX RDF |
RSA-type cryptosystems, RSA moduli, RSA key lengths, diminished-radix moduli, key transport, key storage, key transmission, tamper-resistant devices, smart cards, key escrow, key generation, kleptography, setup, key compression |
41 | Yvo Desmedt, Yongge Wang |
Efficient Zero-Knowledge Proofs for Some Practical Graph Problems. |
SCN |
2002 |
DBLP DOI BibTeX RDF |
complexity, graph theory, secret sharing, Zero-knowledge, key-escrow |
40 | Yvo Desmedt |
Securing Traceability of Ciphertexts - Towards a Secure Software Key Escrow System (Extended Abstract). |
EUROCRYPT |
1995 |
DBLP DOI BibTeX RDF |
|
40 | Arjen K. Lenstra, Peter Winkler 0001, Yacov Yacobi |
A Key Escrow System with Warrant Bounds. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
39 | Yahya Y. Al-Salqan |
Cryptographic Key Recovery. |
FTDCS |
1997 |
DBLP DOI BibTeX RDF |
|
38 | Saeran Kwon, Sang-Ho Lee |
Identity-Based Key Issuing Without Secure Channel in a Broad Area. |
WISA |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Vincent Omollo Nyangaresi, Zaid Ameen Abduljabbar, Ismail Yaqub Maolood, Mustafa A. Al Sibahee, Junchao Ma, Abdulla J. Y. Aldarwish |
Transient Session Key Derivation Protocol for Key Escrow Prevention in Public Key Infrastructure. |
IoECon |
2022 |
DBLP DOI BibTeX RDF |
|
37 | Libo He, Chen Yuan 0002, Hu Xiong, Zhiguang Qin |
Certificateless Key Insulated Encryption: Cryptographic Primitive for Achieving Key-escrow free and Key-exposure Resilience. |
IACR Cryptol. ePrint Arch. |
2016 |
DBLP BibTeX RDF |
|
37 | Libo He, Chen Yuan 0002, Hu Xiong, Zhiguang Qin |
Certificateless Key-Insulated Encryption: Cryptographic Primitive for Achieving Key-Escrow Free and Key-Exposure Resilience. |
BigCom |
2016 |
DBLP DOI BibTeX RDF |
|
35 | Sherman S. M. Chow |
Removing Escrow from Identity-Based Encryption. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Shanqing Guo, Chunhua Zhang |
Identity-based Broadcast Encryption Scheme with Untrusted PKG. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Dae Hyun Yum, Pil Joong Lee |
Generic Construction of Certificateless Signature. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
public-key signature, identity-based signature, Certificateless signature |
33 | Yang Lu 0001, Jiguo Li 0001 |
Forward-Secure Certificate-Based Encryption. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Dae Hyun Yum, Pil Joong Lee |
Identity-Based Cryptography in Public Key Management. |
EuroPKI |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Feng Cao, Zhenfu Cao, Licheng Wang |
An Improvement of an Identity-Based Key Issuing Protocol. |
IMSCCS (2) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Saeran Kwon, Sang-Ho Lee |
Security Analysis and Improvement for Key Issuing Schemes in ID-Based Cryptography. |
TrustBus |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Dae Hyun Yum, Pil Joong Lee |
Generic Construction of Certificateless Encryption. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Shamsher Ullah, Muhammad Tanveer Hussain, Mahwish Yousaf |
QuSigS: A quantum Signcryption scheme to recover key escrow problem and key revocation problem in cloud computing. |
Multim. Tools Appl. |
2022 |
DBLP DOI BibTeX RDF |
|
31 | K. Sowjanya, Mou Dasgupta, Sangram Ray |
A lightweight key management scheme for key-escrow-free ECC-based CP-ABE for IoT healthcare systems. |
J. Syst. Archit. |
2021 |
DBLP DOI BibTeX RDF |
|
31 | Zhen Wang 0011, Zhaofeng Ma, Shoushan Luo, Hongmin Gao 0002 |
Key Escrow Protocol Based on a Tripartite Authenticated Key Agreement and Threshold Cryptography. |
IEEE Access |
2019 |
DBLP DOI BibTeX RDF |
|
31 | Quanyun Wei, Fang Qi, Zhe Tang |
Remove key escrow from the BF and Gentry identity-based encryption with non-interactive key generation. |
Telecommun. Syst. |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Gang Yu, Xiaoxiao Ma, Zhenfu Cao, Weihua Zhu, Junjie Zeng |
Accountable Multi-authority Ciphertext-Policy Attribute-Based Encryption Without Key Escrow and Key Abuse. |
CSS |
2017 |
DBLP DOI BibTeX RDF |
|
31 | Jingqiang Lin, Wen Tao Zhu, Qiongxiao Wang, Nan Zhang, Jiwu Jing, Neng Gao |
RIKE+ : using revocable identities to support key escrow in public key infrastructures with flexibility. |
IET Inf. Secur. |
2015 |
DBLP DOI BibTeX RDF |
|
31 | Mengbo Hou, Qiuliang Xu |
A Secure ID-Based Explicit Authenticated Key Agreement Protocol without Key Escrow. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Hal Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier |
The risks of key recovery, key escrow, and trusted third-party encryption. |
World Wide Web J. |
1997 |
DBLP BibTeX RDF |
|
31 | James Nechvatal |
A Public-Key - Based Key Escrow System. |
J. Syst. Softw. |
1996 |
DBLP DOI BibTeX RDF |
|
30 | Bo Zhang 0020, Qiuliang Xu |
Certificateless Proxy Blind Signature Scheme from Bilinear Pairings. |
WKDD |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Jian Liao, Junfang Xiao, Yinghao Qi, Peiwei Huang, Mentian Rong |
ID-Based Signature Scheme Without Trusted PKG. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Birgit Pfitzmann, Michael Waidner |
How to Break Fraud-Detectable Key Recovery. |
ACM SIGOPS Oper. Syst. Rev. |
1998 |
DBLP DOI BibTeX RDF |
|
30 | Ross J. Anderson, Michael Roe |
The GCHQ Protocol and Its Problems. |
EUROCRYPT |
1997 |
DBLP DOI BibTeX RDF |
|
28 | M. Choudary Gorantla, Ashutosh Saxena |
An Efficient Certificateless Signature Scheme. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Ashutosh Saxena |
Threshold SKI Protocol for ID-based Cryptosystems. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
secure key issuing, ID-based cryptography |
27 | Theodore Diament, Homin K. Lee, Angelos D. Keromytis, Moti Yung |
The dual receiver cryptosystem and its applications. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
useful secure computation, digital signature, elliptic curves, public key, key escrow, puzzles, pairing-based cryptography |
26 | Licheng Wang, Zhenfu Cao, Feng Cao, Haifeng Qian |
Cryptanalysis and Improvement on An ID-Based Key Issuing Protocol. |
IMSCCS (2) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Xu He, Lixiang Li 0001, Haipeng Peng |
A Key Escrow-Free KP-ABE Scheme and Its Application in Standalone Authentication in IoT. |
IEEE Internet Things J. |
2024 |
DBLP DOI BibTeX RDF |
|
26 | Tongda Liu, Zekun Li, Yanyan Ji, Jinyong Chang |
Efficient Key-Escrow-Free and Vehicle-Revocable Data Sharing Protocol for Vehicular Ad Hoc Network. |
IEEE Internet Things J. |
2024 |
DBLP DOI BibTeX RDF |
|
26 | Meijuan Huang, Yutian Liu, Bo Yang 0003, Yanqi Zhao, Mingrui Zhang |
Efficient Revocable Attribute-Based Encryption with Data Integrity and Key Escrow-Free. |
Inf. |
2024 |
DBLP DOI BibTeX RDF |
|
26 | |
Retraction Note: Enhanced post-quantum key escrow system for supervised data conflict of interest based on consortium blockchain. |
J. Comb. Optim. |
2024 |
DBLP DOI BibTeX RDF |
|
26 | Axin Xiang, Hongfeng Gao, Youliang Tian, Liang Wan |
DBKEM-AACS: a distributed key escrow model in blockchain with anonymous authentication and committee selection. |
Sci. China Inf. Sci. |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Mahender Kumar |
An Approach to Remove Key Escrow Problem in ID-Based Encryption From Pairing. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
26 | |
Enhanced post-quantum key escrow system for supervised data conflict of interest based on consortium blockchain. |
J. Comb. Optim. |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Yang Yang, Bingyu Li, Shihong Xiong, Bo Qin, Yan Zhu, Haibin Zheng, Qianhong Wu |
IKE: Threshold Key Escrow Service with Intermediary Encryption. |
ICA3PP (3) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Ruyuan Zhang, Jiguo Li 0001, Yang Lu 0001, Jinguang Han, Yichen Zhang 0003 |
Key escrow-free attribute based encryption with user revocation. |
Inf. Sci. |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Giuseppe Ungaro, Francesco Ricchitelli, Ingrid Huso, Giuseppe Piro, Gennaro Boggia |
Design and Implementation of a Lawful Interception Architecture for B5G Systems Based on Key Escrow. |
CSCN |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Soheyla ZakeriKia, Rahman Hajian, Seyed Hossein Erfani, Amir Masoud Rahmani |
Robust and anonymous handover authentication scheme without key escrow problem in vehicular sensor networks. |
Wirel. Networks |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Xiaowen Cai, Wenjing Cheng, Minghui Zhang, Chen Qian, Zhengwei Ren, Shiwei Xu, Jianying Zhou 0001 |
Post-quantum Key Escrow for Supervised Secret Data Sharing on Consortium Blockchain. |
CSS |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Sungyong Cha, Seungsoo Baek, Seungjoo Kim |
Blockchain Based Sensitive Data Management by Using Key Escrow Encryption System From the Perspective of Supply Chain. |
IEEE Access |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Umasankararao Varri, Syam Kumar Pasupuleti, K. V. Kadambari |
Key-Escrow Free Attribute-Based Multi-Keyword Search with Dynamic Policy Update in Cloud Computing. |
CCGRID |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Nyamsuren Vaanchig, Hu Xiong, Wei Chen, Zhiguang Qin |
Achieving Collaborative Cloud Data Storage by Key-Escrow-Free Multi-Authority CP-ABE Scheme with Dual-Revocation. |
Int. J. Netw. Secur. |
2018 |
DBLP BibTeX RDF |
|
26 | Yang Chen, Qiaoyan Wen, Wenmin Li 0001, Hua Zhang 0001, Zhengping Jin |
Generic Construction of Outsourced Attribute-Based Encryption Without Key Escrow. |
IEEE Access |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Rihab Boussada, Mohamed Elhoucine Elhdhili, Leïla Azouz Saïdane |
Toward privacy preserving in IoT e-health systems: A key escrow identity-based encryption scheme. |
CCNC |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Dan Liu, Shun Zhang 0002, Hong Zhong 0001, Runhua Shi, Yimin Wang |
An Efficient ID-based Online/Offline Signature Scheme without Key Escrow. |
Int. J. Netw. Secur. |
2017 |
DBLP BibTeX RDF |
|
26 | Nazatul Haque Sultan, Ferdous Ahmed Barbhuiya, Nityananda Sarma |
A universal cloud user revocation scheme with key-escrow resistance for ciphertext-policy attribute-based access control. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Yuanlong Li, Fang Qi, Zhe Tang |
An Efficient Hierarchical Identity-Based Encryption Scheme for the Key Escrow. |
SpaCCS |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Yongtao Wang, Xiaonan Liu, Lulu Liang, Weiduan Feng, Guang Yang |
Mitigating Key Escrow in Attribute-Based Encryption. |
Int. J. Netw. Secur. |
2015 |
DBLP BibTeX RDF |
|
26 | Manik Lal Das |
Key-escrow free multi-signature scheme using bilinear pairings. |
Groups Complex. Cryptol. |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Xing Zhang 0002, Cancan Jin, Zilong Wen, Qingni Shen, Yuejian Fang, Zhonghai Wu |
Attribute-Based Encryption Without Key Escrow. |
ICCCS |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Peixin Chen, Xiaofeng Wang 0002, Baokang Zhao, Jinshu Su, Ilsun You |
Removing Key Escrow from the LW-HIBE Scheme. |
ICA3PP (Workshops and Symposiums) |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Jianhong Zhang, Zhibin Sun |
An ID-Based Server-Aided Verification Short Signature Scheme Avoid Key Escrow. |
J. Inf. Sci. Eng. |
2013 |
DBLP BibTeX RDF |
|
26 | Yan Zhu 0010, Di Ma, Shan-Biao Wang, Rong-Quan Feng |
Efficient Identity-Based Encryption without Pairings and Key Escrow for Mobile Devices. |
WASA |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Nan Zhang, Jingqiang Lin, Jiwu Jing, Neng Gao |
RIKE: Using Revocable Identities to Support Key Escrow in PKIs. |
ACNS |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Mike Just |
Key Escrow. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Kyusuk Han, Chan Yeob Yeun, Taeshik Shon, Jong Hyuk Park, Kwangjo Kim |
A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication. |
Int. J. Commun. Syst. |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Manik Lal Das |
A Key Escrow-Free Identity-Based Signature Scheme without using Secure Channel. |
Cryptologia |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Aymen Boudguiga, Maryline Laurent |
Key-escrow resistant ID-based authentication scheme for IEEE 802.11s mesh networks. |
WCNC |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Matt Blaze |
Key escrow from a safe distance: looking back at the Clipper Chip. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Tsz Hon Yuen, Willy Susilo, Yi Mu 0001 |
How to construct identity-based signatures without the key escrow problem. |
Int. J. Inf. Sec. |
2010 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 221 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ >>] |
|