Identity-Based Multisignature with Message Recovery (English)
- New search for: Wang, Kefeng
- New search for: Mu, Yi
- New search for: Susilo, Willy
- New search for: Wang, Kefeng
- New search for: Mu, Yi
- New search for: Susilo, Willy
In:
Information Security Practice and Experience
2
;
91-104
;
2013
- Article/Chapter (Book) / Electronic Resource
-
Title:Identity-Based Multisignature with Message Recovery
-
Contributors:
-
Published in:Information Security Practice and Experience , 2 ; 91-104Lecture Notes in Computer Science ; 7863, 2 ; 91-104
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2013-01-01
-
Size:14 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Enhancing False Alarm Reduction Using Pool-Based Active Learning in Network Intrusion DetectionMeng, Yuxin / Kwok, Lam-For et al. | 2013
- 16
-
Trusted Identity Management for Overlay NetworksKraxberger, Stefan / Toegl, Ronald / Pirker, Martin / Guijarro, Elisa Pintado / Millan, Guillermo Garcia et al. | 2013
- 3
-
Situational Awareness for Improving Network Resilience ManagementLiu, Mixia / Feng, Tao / Smith, Paul / Hutchison, David et al. | 2013
- 44
-
Optimal Defense Strategies for DDoS Defender Using Bayesian Game ModelLiu, Yuling / Feng, Dengguo / Lian, Yifeng / Chen, Kai / Zhang, Yingjun et al. | 2013
- 60
-
Attribute Specified Identity-Based EncryptionXiong, Hao / Yuen, Tsz Hon / Zhang, Cong / He, Yi-Jun / Yiu, Siu Ming et al. | 2013
- 75
-
Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and ConstructionsZhang, Mingwu / Shi, Wei / Wang, Chunzhi / Chen, Zhenhua / Mu, Yi et al. | 2013
- 91
-
Identity-Based Multisignature with Message RecoveryWang, Kefeng / Mu, Yi / Susilo, Willy et al. | 2013
- 105
-
Improving the Message-Ciphertext Rate of Lewko’s Fully Secure IBE SchemeJia, Dingding / Li, Bao / Liu, Yamin / Mei, Qixiang et al. | 2013
- 117
-
Accountable Trapdoor Sanitizable SignaturesLai, Junzuo / Ding, Xuhua / Wu, Yongdong et al. | 2013
- 132
-
A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-ReleaseLiang, Kaitai / Huang, Qiong / Schlegel, Roman / Wong, Duncan S. / Tang, Chunming et al. | 2013
- 147
-
About Hash into Montgomery Form Elliptic CurvesYu, Wei / Wang, Kunpeng / Li, Bao / Tian, Song et al. | 2013
- 160
-
Joint Triple-Base Number System for Multi-Scalar MultiplicationYu, Wei / Wang, Kunpeng / Li, Bao / Tian, Song et al. | 2013
- 174
-
Anonymous Authentication of Visitors for Mobile Crowd Sensing at Amusement ParksKonidala, Divyan Munirathnam / Deng, Robert H. / Li, Yingjiu / Lau, Hoong Chuin / Fienberg, Stephen E. et al. | 2013
- 189
-
Secure RFID Ownership Transfer ProtocolsLi, Nan / Mu, Yi / Susilo, Willy / Varadharajan, Vijay et al. | 2013
- 204
-
Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input ModelYang, Guomin / Mu, Yi / Susilo, Willy / Wong, Duncan S. et al. | 2013
- 218
-
Simplified PACE|AA ProtocolHanzlik, Lucjan / Krzywiecki, Łukasz / Kutyłowski, Mirosław et al. | 2013
- 233
-
Expressing User Access Authorization Exceptions in Conventional Role-Based Access ControlLiu, Xiaofan / Alechina, Natasha / Logan, Brian et al. | 2013
- 248
-
Efficient Attack Detection Based on a Compressed ModelJin, Shichao / Kim, Okhee / Chen, Tieming et al. | 2013
- 263
-
A Digital Forensic Framework for Automated User Activity ReconstructionKang, Jungin / Lee, Sangwook / Lee, Heejo et al. | 2013
- 278
-
Increasing Automated Vulnerability Assessment Accuracy on Cloud and Grid MiddlewareSerrano, Jairo / Cesar, Eduardo / Heymann, Elisa / Miller, Barton et al. | 2013
- 295
-
VulLocator: Automatically Locating Vulnerable Code in Binary ProgramsZhang, Yingjun / Chen, Kai / Lian, Yifeng et al. | 2013
- 309
-
Software Protection with Obfuscation and EncryptionBalachandran, Vivek / Emmanuel, Sabu et al. | 2013
- 321
-
Secure Content Delivery in DRM System with Consumer PrivacyMishra, Dheerendra / Mukhopadhyay, Sourav et al. | 2013
- 336
-
Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test Based Side-Channel DistinguishersZhao, Hui / Zhou, Yongbin / Standaert, François-Xavier / Zhang, Hailong et al. | 2013
- 353
-
Cryptanalysis of the OKH Authenticated Encryption SchemeWang, Peng / Wu, Wenling / Zhang, Liting et al. | 2013
- 361
-
Security Evaluation of Rakaposhi Stream CipherOrumiehchiha, Mohammad Ali / Pieprzyk, Josef / Shakour, Elham / Steinfeld, Ron et al. | 2013
- 372
-
Improved Algebraic and Differential Fault Attacks on the KATAN Block CipherSong, Ling / Hu, Lei et al. | 2013