共 50 条
- [21] Efficient and secure encryption schemes for JPEG2000 [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL V, PROCEEDINGS: DESIGN AND IMPLEMENTATION OF SIGNAL PROCESSING SYSTEMS INDUSTRY TECHNOLOGY TRACKS MACHINE LEARNING FOR SIGNAL PROCESSING MULTIMEDIA SIGNAL PROCESSING SIGNAL PROCESSING FOR EDUCATION, 2004, : 869 - 872
- [22] CCA SECURE CERTIFICATELESS ENCRYPTION SCHEMES BASED ON RSA [J]. SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 208 - 217
- [23] Lighten Encryption Schemes for Secure and Private RFID Systems [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2010, 6054 : 19 - +
- [25] A Secure Database System using Homomorphic Encryption Schemes [J]. DBKDA 2011: THE THIRD INTERNATIONAL CONFERENCE ON ADVANCES IN DATABASES, KNOWLEDGE, AND DATA APPLICATIONS, 2011, : 54 - 58
- [26] Efficient and short certificateless signatures secure against realistic adversaries [J]. The Journal of Supercomputing, 2011, 55 : 173 - 191
- [27] Two-Source Extractors Secure against Quantum Adversaries [J]. APPROXIMATION, RANDOMIZATION, AND COMBINATORIAL OPTIMIZATION: ALGORITHMS AND TECHNIQUES, 2010, 6302 : 656 - 669
- [28] Artemia: A Family of Provably Secure Authenticated Encryption Schemes [J]. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 6 (02): : 125 - 139
- [29] A Secure High-dimension Consensus Mechanism against Adversaries [J]. 2021 AMERICAN CONTROL CONFERENCE (ACC), 2021, : 789 - 794
- [30] Certificateless encryption schemes strongly secure in the standard model [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2008, 2008, 4939 : 344 - +