-
21
Novel hierarchical identity-based encryption scheme from lattice
Published 2017-11-01Subjects: Get full text
Article -
22
Conditions for anonymity in some generic public-key encryption constructions
Published 2009-01-01Subjects: Get full text
Article -
23
ABE-IBS based signature-encryption method for WSN
Published 2010-01-01Subjects: Get full text
Article -
24
Anonymous authentication scheme based on one-off public key in pervasive computing environments
Published 2012-02-01Subjects: Get full text
Article -
25
Identity-based provable data possession scheme for multi-source IoT terminal data in public cloud
Published 2021-07-01Subjects: Get full text
Article -
26
A Blockchain Network Admission Control Mechanism Using Anonymous Identity-Based Cryptography
Published 2024-12-01Subjects: Get full text
Article -
27
-
28
Identity-based ring signature scheme under standard model
Published 2008-01-01Subjects: Get full text
Article -
29
ID-based on-line/off-line threshold signature scheme without bilinear pairing
Published 2013-08-01Subjects: Get full text
Article -
30
Identity-based encryption scheme against adaptive leakage
Published 2012-07-01Subjects: Get full text
Article -
31
User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment
Published 2025-01-01Subjects: Get full text
Article -
32
Identity-based incremental signature scheme from lattices
Published 2021-01-01Subjects: Get full text
Article -
33
Identity-based fully homomorphic encryption from learning with error problem
Published 2014-02-01Subjects: Get full text
Article -
34
A Compact Multi-Identity Fully Homomorphic Encryption Scheme Without Fresh Ciphertexts
Published 2025-01-01Subjects: Get full text
Article -
35
New group key management framework for mobile ad hoc network based on identity authentication in elliptic curve field
Published 2007-01-01Subjects: Get full text
Article -
36
Pre-distribution asymmetric key management scheme for mobile ad hoc networks
Published 2012-10-01Subjects: Get full text
Article -
37
On-demand key management based on social attribute for opportunistic networks
Published 2012-12-01Subjects: Get full text
Article -
38
Efficient identity-based fully homomorphic encryption over NTRU
Published 2017-01-01Subjects: Get full text
Article -
39
Escrow mechanism for personal security keys on IBE
Published 2009-01-01Subjects: Get full text
Article -
40
New signcryption algorithm for secure communication of ad hoc networks
Published 2010-01-01Subjects: Get full text
Article