共 50 条
- [21] Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs Journal of Ambient Intelligence and Humanized Computing, 2016, 7 : 681 - 692
- [22] Public-Key Encryption Resilient Against Linear Related-Key Attacks Revisited 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 268 - 275
- [23] On the Security of OCDM-based Encryption against Key-Search Attacks 2009 DIGEST OF THE LEOS SUMMER TOPICAL MEETINGS, 2009, : 17 - 18
- [24] Secure searchable public key encryption scheme against keyword guessing attacks IEICE ELECTRONICS EXPRESS, 2009, 6 (05): : 237 - 243
- [25] A Fast Public Key Searchable Encryption Scheme Against Inside Keyword Attacks COMPUTER SUPPORTED COOPERATIVE WORK AND SOCIAL COMPUTING, CHINESECSCW 2019, 2019, 1042 : 50 - 64
- [28] A New Scheme for Protecting Master-Key of Data Centre Web Server in Online Banking WEB INFORMATION SYSTEMS AND MINING, 2010, 6318 : 179 - 186
- [29] Fully Secure Wicked Identity-Based Encryption Against Key Leakage Attacks COMPUTER JOURNAL, 2015, 58 (10): : 2520 - 2536