Leakage-Resilient Dual-Form Signatures (English)
- New search for: Huang, J.
- New search for: Huang, Q.
- New search for: Susilo, W.
- New search for: Huang, J.
- New search for: Huang, Q.
- New search for: Susilo, W.
In:
COMPUTER JOURNAL
;
61
, 8
;
1216-1227
;
2018
-
ISSN:
- Article (Journal) / Print
-
Title:Leakage-Resilient Dual-Form Signatures
-
Contributors:
-
Published in:COMPUTER JOURNAL ; 61, 8 ; 1216-1227
-
Publisher:
- New search for: Oxford University Press
-
Publication date:2018-01-01
-
Size:12 pages
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 510.78 / 510
- Further information on Dewey Decimal Classification
-
Classification:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 61, Issue 8
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1109
-
A Framework for Testing and Monitoring Security Policies: Application to an Electronic Voting SystemToumi, K. / Aouadi, M. / Cavalli, A. R. / Mallouli, W. / Allepuz, J. P. / Montfort, P. V. et al. | 2018
- 1123
-
An Authentication Method Based on the Turtle Shell Algorithm for Privacy-Preserving Data MiningWang, R. / Zhu, Y. / Chen, T.-S. / Chang, C.-C. et al. | 2018
- 1133
-
Secure and Efficient Attribute-Based Encryption with Keyword SearchWang, H. / Dong, X. / Cao, Z. / Li, D. et al. | 2018
- 1143
-
SmiDCA: An Anti-Smishing Model with Machine Learning ApproachSonowal, G. / Kuppusamy, K. S. et al. | 2018
- 1158
-
Meet-in-the-Middle Attacks on Reduced-Round QARMA-64/128Li, R. / Jin, C. et al. | 2018
- 1166
-
Fault Attack on ACORN v3Zhang, X. / Feng, X. / Lin, D. et al. | 2018
- 1180
-
A Secure Self-Synchronized Stream CipherDaneshgar, A. / Mohebbipoor, F. et al. | 2018
- 1202
-
A New Software Birthmark based on Weight Sequences of Dynamic Control Flow Graph for Plagiarism DetectionYuan, B. / Wang, J. / Fang, Z. / Qi, L. et al. | 2018
- 1216
-
Leakage-Resilient Dual-Form SignaturesHuang, J. / Huang, Q. / Susilo, W. et al. | 2018
- 1228
-
Klepto for Ring-LWE EncryptionXiao, D. / Yu, Y. et al. | 2018
- 1240
-
Identity-Based Broadcast Encryption for Inner ProductsLai, J. / Mu, Y. / Guo, F. / Jiang, P. / Ma, S. et al. | 2018
- 1252
-
Improved Meet-in-the Middle Attacks on Reduced-Round TWINE-128Liu, Y. / Yang, A. / Dai, B. / Li, W. / Liu, Z. / Gu, D. / Zeng, Z. et al. | 2018
- 1259
-
Bounded Revocable and Outsourceable ABE for Secure Data SharingQin, B. / Zhao, Q. / Zheng, D. et al. | 2018