Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large Universe (English)
- New search for: Liu, Zhen
- New search for: Wong, Duncan S.
- New search for: Liu, Zhen
- New search for: Wong, Duncan S.
In:
The computer journal
;
59
, 7
;
983-
;
2016
- Article (Journal) / Electronic Resource
-
Title:Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large Universe
-
Contributors:Liu, Zhen ( author ) / Wong, Duncan S. ( author )
-
Published in:The computer journal ; 59, 7 ; 983-
-
Publisher:
- New search for: Oxford University Press
-
Publication date:2016-07-01
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents – Volume 59, Issue 7
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 945
-
Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge ProtocolLiu, Joseph K. / Yeo, Sze Ling / Yap, Wun-She / Chow, Sherman S. M. / Wong, Duncan S. / Susilo, Willy et al. | 2016
- 955
-
Online/Offline Ciphertext Retrieval on Resource Constrained DevicesJiang, Peng / Mu, Yi / Guo, Fuchun / Wang, Xiaofen / Wen, Qiaoyan et al. | 2016
- 970
-
A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles: Table 1Ge, Chunpeng et al. | 2016
- 970
-
A Key-Policy Attribute-Based Proxy Re-Encryption Without Random OraclesGe, Chunpeng / Susilo, Willy / Wang, Jiandong / Huang, Zhiqiu / Fang, Liming / Ren, Yongjun et al. | 2016
- 983
-
Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large UniverseLiu, Zhen / Wong, Duncan S. et al. | 2016
- 1005
-
Modeling and Quantitative Verification of Trust Systems Against Malicious AttackersBidgoly, Amir Jalaly / Ladani, Behrouz Tork et al. | 2016
- 1028
-
Certificate-Based Key-Insulated Signature in the Standard Model: TABLE 1Li, Jiguo et al. | 2016
- 1028
-
Certificate-Based Key-Insulated Signature in the Standard ModelLi, Jiguo / Du, Haiting / Zhang, Yichen et al. | 2016
- 1040
-
Efficient Privacy-Preserving Charging Station Reservation System for Electric VehiclesLiu, Joseph K. / Susilo, Willy / Yuen, Tsz Hon / Au, Man Ho / Fang, Junbin / Jiang, Zoe L. / Zhou, Jianying et al. | 2016
- 1054
-
An AES-Like Cipher and Its White-Box ImplementationBai, Kunpeng / Wu, Chuankun et al. | 2016
- 1066
-
A Leakage-Resilient CCA-Secure Identity-Based Encryption SchemeLi, Jiguo / Teng, Meilin / Zhang, Yichen / Yu, Qihong et al. | 2016
- 1076
-
An End-to-End Security Approach for Digital Document ManagementMunoz-Hernandez, Mario Diego / Morales-Sandoval, Miguel / Garcia-Hernandez, Jose Juan et al. | 2016
- 1091
-
Very Small FPGA Processor for Multivariate SignaturesYi, Haibo / Tang, Shaohua et al. | 2016
- 1102
-
Fast Inversions in Small Finite Fields by Using Binary TreesYi, Haibo / Tang, Shaohua / Vemuri, Ranga et al. | 2016