共 50 条
- [41] Non-Interactive and secure outsourcing of PCA-Based face recognition Ren, Yanli (renyanli@shu.edu.cn), 1600, Elsevier Ltd (110):
- [42] UC-Secure Non-Interactive Public-Key Encryption 2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 217 - 233
- [43] Mobile agent protection based on non-interactive secure function evaluation Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2004, 38 (07): : 848 - 850
- [44] Adaptively-secure, non-interactive public-key encryption THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2005, 3378 : 150 - 168
- [45] On Proving Equivalence Class Signatures Secure from Non-interactive Assumptions PUBLIC-KEY CRYPTOGRAPHY, PT I, PKC 2024, 2024, 14601 : 3 - 36
- [46] Forward Secure Non-Interactive Key Exchange from Indistinguishability Obfuscation 2015 5TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2015,
- [47] A secure non-interactive deniable authentication protocol based on discrete logarithms ICIC Express Letters, Part B: Applications, 2012, 3 (03): : 507 - 512
- [49] Non-Interactive Anonymous Router with Quasi-Linear Router Computation THEORY OF CRYPTOGRAPHY, TCC 2023, PT III, 2023, 14371 : 62 - 92