-
1
Lattice-based verifiable timed signature and application
Published 2024-10-01Subjects: “…verifiable timed signature…”
Get full text
Article -
2
Verifiable special threshold secret sharing scheme based on eigenvalue
Published 2018-08-01Subjects: Get full text
Article -
3
Dual verifiable cloud storage scheme based on blockchain
Published 2021-12-01Subjects: Get full text
Article -
4
Blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid
Published 2024-01-01Subjects: Get full text
Article -
5
Highly efficient compact verifiable shuffle scheme based on QA-NIZK proof
Published 2015-09-01Subjects: “…compact verifiable shuffle…”
Get full text
Article -
6
Verifiable federated aggregation method based on homomorphic proxy re-authentication
Published 2024-06-01Subjects: Get full text
Article -
7
Verifiable attribute-based searchable encryption scheme based on blockchain
Published 2020-02-01Subjects: Get full text
Article -
8
Verifiable computation scheme of batch matrix multiplication based on triple perturbation and linear combination
Published 2024-04-01Subjects: Get full text
Article -
9
Verifiably private outsourcing scheme for multivariate polynomial evaluation
Published 2015-08-01Subjects: Get full text
Article -
10
Verifiable multi-secret sharing schemes applicable to arbitrary access structures
Published 2007-01-01Subjects: Get full text
Article -
11
Sybil-Resistant Self-Sovereign Identity Utilizing Attested Execution Secure Processors and Zero-Knowledge Membership Proofs
Published 2025-01-01Subjects: Get full text
Article -
12
A secure method of voting and planning based on quadratic voting
Published 2025-02-01Subjects: Get full text
Article -
13
Secure and verifiable outsourcing of determinant computing in the cloud and its electronic trading scheme
Published 2016-11-01Subjects: Get full text
Article -
14
Efficient certificateless searchable encryption scheme with verifiability
Published 2023-08-01Subjects: Get full text
Article -
15
Secure efficient and verifiable large linear equations solve outsourcing computing scheme
Published 2017-06-01Subjects: Get full text
Article -
16
Honest Computing: achieving demonstrable data lineage and provenance for driving data and process-sensitive policies
Published 2024-01-01Subjects: Get full text
Article -
17
Practical group signature scheme with verifier-local revocation
Published 2011-01-01Subjects: Get full text
Article -
18
Efficient fuzzy attribute-based signcryption scheme
Published 2013-08-01Subjects: Get full text
Article -
19
CRITICAL STATE SELECTION OF THE DYNAMIC HORIZONTAL IMPACT TEST FOR A CERTAIN TYPE AIRLINE SEAT INSTALLED
Published 2016-01-01Subjects: Get full text
Article -
20
Threshold re-encryption based secure deduplication method for cloud data with resistance against side channel attack
Published 2020-06-01Subjects: Get full text
Article