×

Found 5 Documents (Results 1–5)

Dynamic secure cloud storage with provenance. (English) Zbl 1301.68116

Naccache, David (ed.), Cryptography and security: From theory to applications. Essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday. Berlin: Springer (ISBN 978-3-642-28367-3/pbk). Lecture Notes in Computer Science 6805, 442-464 (2012).
MSC:  68P25 94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Identity-based server-aided decryption. (English) Zbl 1295.94107

Parampalli, Udaya (ed.) et al., Information security and privacy. 16th Australasian conference, ACISP 2011, Melbourne, Australia, July 11–13, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22496-6/pbk). Lecture Notes in Computer Science 6812, 337-352 (2011).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

On shortening ciphertexts: new constructions for compact public key and stateful encryption schemes. (English) Zbl 1284.94051

Kiayias, Aggelos (ed.), Topics in cryptology – CT-RSA 2011. The cryptographers’ track at the RSA conference 2011, San Francisco, CA, USA, February 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19073-5/pbk). Lecture Notes in Computer Science 6558, 302-318 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Conditional proxy broadcast re-encryption. (English) Zbl 1284.94065

Boyd, Colin (ed.) et al., Information security and privacy. 14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1–3, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02619-5/pbk). Lecture Notes in Computer Science 5594, 327-342 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Filter Results by …

Document Type

Year of Publication

Main Field