-
1
-
-
33745797863
-
Untraceable RFID Tags via Insubvertible Encryption
-
ACM Press
-
G. Ateniese, J. Camenisch, and B. deMedeiros, "Untraceable RFID Tags via Insubvertible Encryption", In Proceedings of Computer and Communications Security (CCS'05), pp. 92-101, ACM Press, 2005.
-
(2005)
Proceedings of Computer and Communications Security (CCS'05)
, pp. 92-101
-
-
Ateniese, G.1
Camenisch, J.2
deMedeiros, B.3
-
2
-
-
35248851617
-
Correlation- Resistant Storage via KeywordSearchable Encryption
-
L. Ballard, M. Green, B. Medeiros, and F. Monrose, "Correlation- Resistant Storage via KeywordSearchable Encryption", IACR ePrint Cryptography Archive http://eprint.iacr.org/2005/417, 2005.
-
(2005)
IACR ePrint Cryptography Archive
-
-
Ballard, L.1
Green, M.2
Medeiros, B.3
Monrose, F.4
-
3
-
-
85015284120
-
Energy Aware Lossless Data Compression
-
ACM Press
-
K. Barr and K. Asanovic, "Energy Aware Lossless Data Compression". In Proceedings of MobiSys 2003, pp. 231- 244, ACM Press, 2003.
-
(2003)
Proceedings of MobiSys 2003
, pp. 231-244
-
-
Barr, K.1
Asanovic, K.2
-
5
-
-
35048901123
-
Public Key Encryption with Keyword Search
-
Proceedings of EUROCRYPT 2004, Springer-Verlag, pp
-
D. Boneh, G. Crescenzo, R. Ostrovsky, and G. Persiano, "Public Key Encryption with Keyword Search", In Proceedings of EUROCRYPT 2004, LNCS 3027, Springer-Verlag, pp. 506-522, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
6
-
-
35048887476
-
Short Group Signatures
-
Proceedings of CRYPTO 2004, Springer-Verlag, pp
-
D. Boneh, X. Boyen, and H. Shacham, "Short Group Signatures", In Proceedings of CRYPTO 2004, LNCS 3152, Springer-Verlag, pp. 41-55, 2004.
-
(2004)
LNCS
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
7
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Proceedings of CRYPTO 2001, Springer-Verlag, pp
-
D. Boneh and M. Franklin, "Identity-Based Encryption from the Weil Pairing", In Proceedings of CRYPTO 2001, LNCS 2139, Springer-Verlag, pp. 213-229, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
8
-
-
33746214783
-
Efficient Conjunctive Keyword Search on Encrypted Data Storage System
-
Proceedings of EuroPKI 2006, Springer-Verlag, pp
-
J. Byun, D. Lee, and J. Lim, "Efficient Conjunctive Keyword Search on Encrypted Data Storage System", In Proceedings of EuroPKI 2006, LNCS 4043, Springer-Verlag, pp. 184-196, 2006.
-
(2006)
LNCS
, vol.4043
, pp. 184-196
-
-
Byun, J.1
Lee, D.2
Lim, J.3
-
9
-
-
24944435537
-
Compact E-Cash
-
Proceedings of EUROCRYPT 2005, Springer-Verlag, pp
-
J. Camenisch, S. Hohenberger, and A. Lysyanskaya, "Compact E-Cash". In Proceedings of EUROCRYPT 2005, LNCS 3494, Springer-Verlag, pp. 302-321, 2005.
-
(2005)
LNCS
, vol.3494
, pp. 302-321
-
-
Camenisch, J.1
Hohenberger, S.2
Lysyanskaya, A.3
-
10
-
-
26444507272
-
Privacy Preserving Keyword Searches on Remote Encrypted Data
-
Proceedings of Applied Cryptography and Network Security Conference, Springer-Verlag, pp
-
Y. Chang and M. Mitzenmacher, "Privacy Preserving Keyword Searches on Remote Encrypted Data", In Proceedings of Applied Cryptography and Network Security Conference, LNCS 3531, Springer-Verlag, pp. 442-455, 2005.
-
(2005)
LNCS
, vol.3531
, pp. 442-455
-
-
Chang, Y.1
Mitzenmacher, M.2
-
15
-
-
33745120364
-
Secure Conjunctive Keyword Search over Encrypted Data
-
Proceedings of Applied Cryptography and Network Security Conference, Springer-Verlag, pp
-
P. Golle, J. Staddon, and B. Waters, "Secure Conjunctive Keyword Search over Encrypted Data", In Proceedings of Applied Cryptography and Network Security Conference, LNCS 3089, Springer-Verlag, pp. 31-45, 2004.
-
(2004)
LNCS
, vol.3089
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.3
-
16
-
-
33746324862
-
Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles
-
Proceedings of 11th Australasian Conference on Information Security and Privacy, Springer-Verlag, pp
-
E. Kiltzl and D. Galindo, "Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles", In Proceedings of 11th Australasian Conference on Information Security and Privacy, LNCS 4058, Springer-Verlag, pp. 336-347, 2006.
-
(2006)
LNCS
, vol.4058
, pp. 336-347
-
-
Kiltzl, E.1
Galindo, D.2
-
17
-
-
33749984492
-
Comparison of MNT Curves and Supersingular Curves
-
D. Page, N. Smart, and F. Vercauteren, "Comparison of MNT Curves and Supersingular Curves", Applicable Algebra in Engineering, Communication and Computing, Vol. 17(5), pp.379-392, 2006.
-
(2006)
Applicable Algebra in Engineering, Communication and Computing
, vol.17
, Issue.5
, pp. 379-392
-
-
Page, D.1
Smart, N.2
Vercauteren, F.3
-
18
-
-
33646718113
-
Authenticated ID-based Key Exchange and Remote Log-in with Simple Token and PIN
-
M. Scott, "Authenticated ID-based Key Exchange and Remote Log-in with Simple Token and PIN", IACR ePrint Cryptography Archive http://eprint.iacr.org/2002/l 64, 2002.
-
(2002)
IACR ePrint Cryptography Archive
-
-
Scott, M.1
-
19
-
-
0033705124
-
Practical Techniques for Searching on Encrypted Data
-
IEEE Press, pp
-
D. Song, D. Wagner, and A. Perrig, "Practical Techniques for Searching on Encrypted Data", In Proceedings of 2000 IEEE Symposium on Security and Privacy, IEEE Press, pp. 44-55, 2000.
-
(2000)
Proceedings of 2000 IEEE Symposium on Security and Privacy
, pp. 44-55
-
-
Song, D.1
Wagner, D.2
Perrig, A.3
-
20
-
-
33750247597
-
PrivacyPreserving Queries on Encrypted Data
-
Proceedings of the 11th European Symposium on Research in Computer Security, Springer-Verlag, pp
-
Z. Yang, S. Zhong, and R. Wright, "PrivacyPreserving Queries on Encrypted Data", In Proceedings of the 11th European Symposium on Research in Computer Security, LNCS 4189, Springer-Verlag, pp. 479-495, 2006.
-
(2006)
LNCS
, vol.4189
, pp. 479-495
-
-
Yang, Z.1
Zhong, S.2
Wright, R.3
-
21
-
-
77952589508
-
Building an Encrypted and Searchable Audit Log
-
B. Waters, D. Balfanz, G. Durfee, and D. Smetters, "Building an Encrypted and Searchable Audit Log", In Proceedings of 2004 Network and Distributed System Security Symposium, 2004.
-
(2004)
Proceedings of 2004 Network and Distributed System Security Symposium
-
-
Waters, B.1
Balfanz, D.2
Durfee, G.3
Smetters, D.4
|