Search alternatives:
"identity-based" » "identify-based" (Expand Search), "density-based" (Expand Search)
"identity-based" » "identify-based" (Expand Search), "density-based" (Expand Search)
-
1
Evaluation of Computationally Efficient Identity-Based Proxy Signatures
Published 2025-01-01Subjects: “…Identity-based signature…”
Get full text
Article -
2
Efficient traceable identity-based signature scheme
Published 2009-01-01Subjects: “…identity-based cryptography…”
Get full text
Article -
3
Post-Quantum Secure ID-Based (Threshold) Linkable Dual-Ring Signature and Its Application in Blockchain Transactions
Published 2024-10-01Subjects: Get full text
Article -
4
Certificate-based hybrid encryption scheme in the standard model
Published 2009-01-01Subjects: “…certificate-based encryption;identity-based encryption;standard model…”
Get full text
Article -
5
Identity-based cloud storage integrity checking from lattices
Published 2019-04-01Subjects: “…lattice;identity-based cryptography;cloud storage;integrity checking…”
Get full text
Article -
6
Analysis and improvement on identity-based cloud data integrity verification scheme
Published 2018-11-01Subjects: Get full text
Article -
7
Identity-based threshold (multi) signature with private accountability for privacy-preserving blockchain
Published 2024-12-01Subjects: “…Identity-based signature…”
Get full text
Article -
8
Analysis and improvement of an identity-based signature scheme from lattices
Published 2015-05-01Subjects: “…identity-based signature…”
Get full text
Article -
9
Certificate-based hybrid encryption scheme in the standard model
Published 2009-01-01Subjects: Get full text
Article -
10
Revocable Identity-Based Matchmaking Encryption with Equality Test for Smart Healthcare
Published 2025-07-01Subjects: Get full text
Article -
11
Identity-based linear homomorphic signature for a restricted combiners’ group for e-commerce
Published 2025-08-01Subjects: Get full text
Article -
12
-
13
Survey on public key encryption with equality test
Published 2018-11-01Subjects: Get full text
Article -
14
Identity-based puncturable signature scheme
Published 2021-12-01Subjects: “…key exposure;identity-based signature;puncturable signature;Bloom filter…”
Get full text
Article -
15
Identity-based roaming protocol with anonymity for heterogeneous wireless networks
Published 2010-01-01Subjects: Get full text
Article -
16
Cross-domain authentication scheme based on consortium blockchain
Published 2022-06-01Subjects: Get full text
Article -
17
Efficiency identity-based threshold group signature scheme
Published 2009-01-01Subjects: Get full text
Article -
18
Research on wormhole attacks in wireless mesh networks
Published 2011-01-01Subjects: Get full text
Article -
19
-
20
Conditions for anonymity in some generic public-key encryption constructions
Published 2009-01-01Subjects: Get full text
Article