-
1
Practical group signature scheme with verifier-local revocation
Published 2011-01-01Subjects: Get full text
Article -
2
New certificateless aggregate signature scheme with universal designated verifier
Published 2017-11-01Subjects: “…universal designated verifier…”
Get full text
Article -
3
Searchable public key encryption with designated verifier secure against the server
Published 2014-11-01Subjects: Get full text
Article -
4
Post-quantum verifier-based three-party password authenticated key exchange protocol
Published 2022-04-01Subjects: Get full text
Article -
5
Verifier-based password-authenticated key exchange protocol for three-party
Published 2008-01-01Subjects: Get full text
Article -
6
Certificateless strong designated verifier multi-signature
Published 2016-06-01Subjects: Get full text
Article -
7
Certificateless-based efficient aggregate signature scheme with universal designated verifier
Published 2015-02-01Subjects: “…universal designated verifier…”
Get full text
Article -
8
A secure method of voting and planning based on quadratic voting
Published 2025-02-01Subjects: Get full text
Article -
9
Lattice-based verifiable timed signature and application
Published 2024-10-01Subjects: “…verifiable timed signature…”
Get full text
Article -
10
Verifiable special threshold secret sharing scheme based on eigenvalue
Published 2018-08-01Subjects: Get full text
Article -
11
Secure and verifiable outsourcing of determinant computing in the cloud and its electronic trading scheme
Published 2016-11-01Subjects: Get full text
Article -
12
Efficient certificateless searchable encryption scheme with verifiability
Published 2023-08-01Subjects: Get full text
Article -
13
Dual verifiable cloud storage scheme based on blockchain
Published 2021-12-01Subjects: Get full text
Article -
14
Secure efficient and verifiable large linear equations solve outsourcing computing scheme
Published 2017-06-01Subjects: Get full text
Article -
15
Honest Computing: achieving demonstrable data lineage and provenance for driving data and process-sensitive policies
Published 2024-01-01Subjects: Get full text
Article -
16
Blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid
Published 2024-01-01Subjects: Get full text
Article -
17
Efficient fuzzy attribute-based signcryption scheme
Published 2013-08-01Subjects: Get full text
Article -
18
Highly efficient compact verifiable shuffle scheme based on QA-NIZK proof
Published 2015-09-01Subjects: “…compact verifiable shuffle…”
Get full text
Article -
19
CRITICAL STATE SELECTION OF THE DYNAMIC HORIZONTAL IMPACT TEST FOR A CERTAIN TYPE AIRLINE SEAT INSTALLED
Published 2016-01-01Subjects: Get full text
Article -
20
Threshold re-encryption based secure deduplication method for cloud data with resistance against side channel attack
Published 2020-06-01Subjects: Get full text
Article