共 50 条
- [41] Leakage-Resilient Certificate-based Encryption Scheme for IoT Environments [J]. 2018 9TH INTERNATIONAL CONFERENCE ON AWARENESS SCIENCE AND TECHNOLOGY (ICAST), 2018, : 251 - 256
- [42] Efficient leakage-resilient public key encryption from DDH assumption [J]. Cluster Computing, 2013, 16 : 797 - 806
- [43] Identity-Based Encryption Resilient to Continual Leakage Without Random Oracles [J]. FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 53 - 64
- [44] Efficient leakage-resilient public key encryption from DDH assumption [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04): : 797 - 806
- [46] Leakage-Resilient Attribute-Based Encryption with Attribute-Hiding [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2023, PT II, 2024, 14562 : 113 - 132
- [47] Continuous Leakage-Resilient Identity-Based Encryption with Tight Security [J]. COMPUTER JOURNAL, 2019, 62 (08): : 1092 - 1105
- [49] RCB: leakage-resilient authenticated encryption via re-keying [J]. JOURNAL OF SUPERCOMPUTING, 2018, 74 (09): : 4173 - 4198