Publication Venue For Efficient chameleon hash functions in the enhanced collision resistant model 2020 Leakage-resilient group signature: Definitions and constructions 2020 Accountable identity-based encryption with distributed private key generators 2019 Designated-server identity-based authenticated encryption with keyword search for encrypted emails 2019 Efficient attribute-based encryption with attribute revocation for assured data deletion 2019 Experiential probabilistic assessment of cloud services 2019 Fine-grained information flow control using attributes 2019 Generalized public-key cryptography with tight security 2019 Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters 2019 Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation 2019 Universal designated verifier signature scheme with non-delegatability in the standard model 2019 A Generic Scheme of plaintext-checkable database encryption 2018 A cost-effective software testing strategy employing online feedback information 2018 Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes 2018 Online human action recognition based on incremental learning of weighted covariance descriptors 2018 Privacy-enhanced attribute-based private information retrieval 2018 Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack 2018 Witness-based searchable encryption 2018 A framework of mining semantic-based probabilistic event relations for complex activity recognition 2017 How to protect privacy in optimistic fair exchange of digital signatures 2015 Identity-based quotable ring signature 2015 Identity-based chameleon hashing and signatures without key exposure 2014 Fully secure hidden vector encryption under standard assumptions 2013 Generic modelling of security awareness in agent based systems 2013 Public key encryption with keyword search secure against keyword guessing attacks without random oracle 2013 The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles 2013 Group-oriented fair exchange of signatures 2011 Certificateless threshold signature scheme from bilinear maps 2010 Lifetime service level agreement management with autonomous agents for services provision 2009 Efficient generic on-line/off-line (threshold) signatures without key exposure 2008
Publication Venue For Efficient chameleon hash functions in the enhanced collision resistant model 2020 Leakage-resilient group signature: Definitions and constructions 2020 Accountable identity-based encryption with distributed private key generators 2019 Designated-server identity-based authenticated encryption with keyword search for encrypted emails 2019 Efficient attribute-based encryption with attribute revocation for assured data deletion 2019 Experiential probabilistic assessment of cloud services 2019 Fine-grained information flow control using attributes 2019 Generalized public-key cryptography with tight security 2019 Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters 2019 Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation 2019 Universal designated verifier signature scheme with non-delegatability in the standard model 2019 A Generic Scheme of plaintext-checkable database encryption 2018 A cost-effective software testing strategy employing online feedback information 2018 Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes 2018 Online human action recognition based on incremental learning of weighted covariance descriptors 2018 Privacy-enhanced attribute-based private information retrieval 2018 Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack 2018 Witness-based searchable encryption 2018 A framework of mining semantic-based probabilistic event relations for complex activity recognition 2017 How to protect privacy in optimistic fair exchange of digital signatures 2015 Identity-based quotable ring signature 2015 Identity-based chameleon hashing and signatures without key exposure 2014 Fully secure hidden vector encryption under standard assumptions 2013 Generic modelling of security awareness in agent based systems 2013 Public key encryption with keyword search secure against keyword guessing attacks without random oracle 2013 The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles 2013 Group-oriented fair exchange of signatures 2011 Certificateless threshold signature scheme from bilinear maps 2010 Lifetime service level agreement management with autonomous agents for services provision 2009 Efficient generic on-line/off-line (threshold) signatures without key exposure 2008