1–20 of 67 hits

Sort by: Relevancy | Date newest | Title A-Z

Synonyms were used for: Datensicherheit

Search without synonyms: keywords:(Datensicherheit)

Used synonyms:

  • data integrity
  • data security
  • datenintegritat
  • datensicherung
  • security of data
  1.  

    Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage

    Yu, Yong / Au, Man Ho / Mu, Yi et al. | Springer Verlag | 2014
    Keywords: Data integrity, Remote data integrity checking
  2.  

    Secure RFID Ownership Transfer Protocols

    Li, Nan / Mu, Yi / Susilo, Willy et al. | Springer Verlag | 2013
    Keywords: Systems and Data Security
  3.  

    PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption

    Han, Jinguang / Susilo, Willy / Mu, Yi et al. | Springer Verlag | 2014
    Keywords: Systems and Data Security
  4.  

    Compact e-cash from bounded accumulator

    Au, Man Ho / Wu, Qianhong / Susilo, Willy et al. | Tema Archive | 2006
    Keywords: Datensicherheit
  5.  

    Identity-Based Multisignature with Message Recovery

    Wang, Kefeng / Mu, Yi / Susilo, Willy | Springer Verlag | 2013
    Keywords: Systems and Data Security
  6.  

    Attribute-Based Signature with Message Recovery

    Wang, Kefeng / Mu, Yi / Susilo, Willy et al. | Springer Verlag | 2014
    Keywords: Systems and Data Security
  7.  

    Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model

    Yang, Guomin / Mu, Yi / Susilo, Willy et al. | Springer Verlag | 2013
    Keywords: Systems and Data Security
  8.  

    Policy-Controlled Signatures

    Thorncharoensri, Pairat / Susilo, Willy / Mu, Yi | Springer Verlag | 2009
    Keywords: Systems and Data Security
  9.  

    Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions

    Zhang, Mingwu / Shi, Wei / Wang, Chunzhi et al. | Springer Verlag | 2013
    Keywords: Systems and Data Security
  10.  

    Optimal Online/Offline Signature: How to Sign a Message without Online Computation

    Guo, Fuchun / Mu, Yi | Springer Verlag | 2008
    Keywords: Systems and Data Security
  11.  

    Secure Image Retrieval Based on Visual Content and Watermarking Protocol

    Zhang, Jun / Xiang, Yang / Zhou, Wanlei et al. | Tema Archive | 2011
    Keywords: Datensicherheit
  12.  

    Security patterns: a method for constructing secure and efficient inter-company coordination systems

    Yoshioka, N. / Honiden, S. / Finkelstein, A. | Tema Archive | 2004
    Keywords: Datensicherheit
  13.  

    Membership Encryption and Its Applications

    Guo, Fuchun / Mu, Yi / Susilo, Willy et al. | Springer Verlag | 2013
    Keywords: Systems and Data Security
  14.  

    Complete Robustness in Identity-Based Encryption

    Cui, Hui / Mu, Yi / Au, Man Ho | Springer Verlag | 2014
    Keywords: Systems and Data Security
  15.  

    Anonymous Identity-Based Broadcast Encryption with Adaptive Security

    Zhang, Leyou / Wu, Qing / Mu, Yi | Springer Verlag | 2013
    Keywords: Systems and Data Security
  16.  

    Attribute-Based Signing Right Delegation

    Liu, Weiwei / Mu, Yi / Yang, Guomin | Springer Verlag | 2014
    Keywords: Systems and Data Security
  17.  

    Jhanwar-Barua’s Identity-Based Encryption Revisited

    Elashry, Ibrahim / Mu, Yi / Susilo, Willy | Springer Verlag | 2014
    Keywords: Systems and Data Security
  18.  

    Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage

    Yu, Yong / Mu, Yi / Ni, Jianbing et al. | Springer Verlag | 2014
    Keywords: Systems and Data Security
  19.  

    Anonymous Signcryption against Linear Related-Key Attacks

    Cui, Hui / Mu, Yi / Au, Man Ho | Springer Verlag | 2013
    Keywords: Systems and Data Security
  20.  

    k-time Proxy Signature: Formal Definition and Efficient Construction

    Liu, Weiwei / Yang, Guomin / Mu, Yi et al. | Springer Verlag | 2013
    Keywords: Systems and Data Security

Number of results: 10 | 20 | 50

Feedback