115 papers found
Refreshing results…
Generalised Key Delegation for Hierarchical Identity-Based Encryption
Download from www.researchgate.netA Study of Blind Message Authentication Codes
Download from journals.fcla.eduResisting against aggregator compromises in sensor networks
Download from www.researchgate.netOn the (Im)possibility of Blind Message Authentication Codes
Download from www.researchgate.netProvably secure password-based authentication in TLS
Download from www.researchgate.netIdentity-Based Encryption Gone Wild
Download from www.researchgate.netOne-Time Verifier-Based Encrypted Key Exchange
Download from link.springer.comSimple Password-Based Encrypted Key Exchange Protocols
Download from www.researchgate.netOn the Minimal Assumptions of Group Signature Schemes
Download from www.researchgate.netMissing publications? Read more about our data sources.