| 2025-12 |
A Secure Sharing Framework for Time-Sensitive Personal Health Records Based on FHIR, IPFS, and Consortium Blockchain |
conference |
web page(21) |
| 2025-12 |
COMPASS: A Compact PASS-Lineage Accumulator with Succinct Proofs |
conference |
web page(23) |
| 2025-12 |
A Layered Trust Architecture for Global Healthcare Services: Integrating WHO and EU Digital Identity Frameworks |
conference |
web page(21) |
| 2025-12 |
Design of a Secure Cryptographic Protocol for Digital Evidence Chain for Intelligent Transportation Systems with Internet of Medical Things |
conference |
web page(25) |
| 2025-11 |
A Study on Metaverse Identity Authentication Design Based on FIDO and Kerberos |
conference |
web page(27) |
| 2025-10 |
Preventing Witness Leakage in Adaptor Signatures |
article |
web page(16) |
| 2024-12 |
Quantum-Resistant Updatable Public Keys: Enhancing the Quisquis Protocol with LWE-Based Security |
conference |
web page(70) |
| 2024-09 |
Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates |
article |
web page(371) |
| 2024-04 |
Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systems |
article |
web page(539) |
| 2024-01 |
Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives |
article |
web page(534) |
| 2023-11 |
基於ECDH和短簽名的群組密鑰機制之分析與改良 |
conference |
pdf(3) |
| 2023-08 |
Cryptanalysis of a round optimal lattice-based multisignature scheme |
article |
web page(613) |
| 2022-11 |
智慧製造 |
book |
web page(767) |
| 2022-09 |
Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT |
article |
web page(522) |
| 2022-08 |
Quantum-resistant 1-out-of-N Oblivious Signatures from Lattices |
conference |
web page(564) |
| 2022-06 |
Extension of elliptic curve Qu–Vanstone certificates and their applications |
article |
web page(545) |
| 2022-05 |
Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation |
conference |
web page(646) |
| 2022-03 |
Quantum-resistant anonymous identity-based encryption with trable identities |
article |
web page(625) |
| 2021-09 |
A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism |
article |
web page(663) |
| 2021-05 |
Designated-ciphertext searchable encryption |
article |
pdf(555) |
| 2021-02 |
Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function |
article |
pdf(646) |
| 2021-02 |
Partially Blind ECDSA Scheme and Its Application to Bitcoin |
conference |
pdf(737) |
| 2021-01 |
Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks |
article |
pdf(655) |
| 2020-11 |
Intelligence-led response: turning theory into law enforcement practice in cyber security incidents |
article |
web page(599) |
| 2020-10 |
Defense against N-pixel Attacks based on Image Reconstruction |
conference |
pdf(617) |