kw.\*:("Oráculo aleatorio")
Results 1 to 9 of 9
Selection :
Lattice-based message recovery signature schemesMIAOMIAO TIAN; LIUSHENG HUANG.International journal of electronic security and digital forensics (Print). 2013, Vol 5, Num 3-4, pp 257-269, issn 1751-911X, 13 p.Article
Tuning a two-round group key agreementWEIZHENG GAO; NEUPANE, Kashi; STEINWANDT, Rainer et al.International journal of information security (Print). 2014, Vol 13, Num 5, pp 467-476, issn 1615-5262, 10 p.Article
Unforgeability of an improved certificateless signature scheme in the standard modelCHAOWEN GUAN; JIAN WENG; DENG, Robert H et al.IET information security (Print). 2014, Vol 8, Num 5, pp 273-276, issn 1751-8709, 4 p.Article
Threshold attribute-based encryption with attribute hierarchy for lattices in the standard modelXIMENG LIU; JIANFENG MA; JINBO XIONG et al.IET information security (Print). 2014, Vol 8, Num 4, pp 217-223, issn 1751-8709, 7 p.Article
Verifier-based three-party authentication schemes using extended chaotic maps for data exchange in telecare medicine information systemsLEE, Tian-Fu.Computer methods and programs in biomedicine (Print). 2014, Vol 117, Num 3, pp 464-472, issn 0169-2607, 9 p.Article
Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networksYINGHUI ZHANG; XIAOFENG CHEN; JIN LI et al.Computer networks (1999). 2014, Vol 75, pp 192-211, issn 1389-1286, 20 p., aArticle
Private mutual authentications with fuzzy matchingYAMIN WEN; ZHENG GONG.International journal of high performance systems architecture (Print). 2014, Vol 5, Num 1, pp 3-12, issn 1751-6528, 10 p.Conference Paper
A Provably Secure ID-Based Mutual Authentication and Key Agreement Scheme for Mobile Multi-Server Environment Without ESL AttackSK HAFIZUL ISLAM.Wireless personal communications. 2014, Vol 79, Num 3, pp 1975-1991, issn 0929-6212, 17 p.Article
Versatile identity-based signatures for authentication in multi-user settingsXI SUN; ZHENGTAO JIANG; MEIRONG ZHOU et al.International journal of grid and utility computing (Print). 2014, Vol 5, Num 3, pp 156-164, issn 1741-847X, 9 p.Article