Filter your results
- 4
- 4
- 4
- 1
- 1
- 1
- 2
- 4
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
A Signature Scheme Based on Implicit and Explicit Certificates Against k-Traitors Collusion Attack16th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Jun 2017, Bialystok, Poland. pp.638-651, ⟨10.1007/978-3-319-59105-6_55⟩
Conference papers
hal-01656248v1
|
||
|
Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.214-232, ⟨10.1007/978-3-642-13241-4_20⟩
Conference papers
hal-01056377v1
|
||
|
Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.209-222, ⟨10.1007/978-3-642-12510-2_15⟩
Conference papers
hal-01056105v1
|
||
|
Cryptanalysis of Goriparthi et al.’s Bilinear Pairing Based Remote User Authentication Scheme9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.581-588, ⟨10.1007/978-3-642-35606-3_69⟩
Conference papers
hal-01551363v1
|