Keywords: امنیت قابل اطمینان; Threshold attribute-based encryption; Constant size; Dummy attributes; Provable security;
مقالات ISI امنیت قابل اطمینان (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: امنیت قابل اطمینان; Digital signature; Elliptic curve; Certificateless cryptography; Random oracle model; Provable security;
Keywords: امنیت قابل اطمینان; Access control scheme; Certificate-based signcryption; Continuous leakage resilience; Wireless sensor networks; Provable security;
Keywords: امنیت قابل اطمینان; Database encryption; Plaintext-checkable encryption; Provable security;
Keywords: امنیت قابل اطمینان; Identity-based encryption; Equality test; Searchable encryption; Cloud computing; Provable security;
Keywords: امنیت قابل اطمینان; Searchable encryption; Secure keyword search; Authorization; Provable security; Database system management;
Keywords: امنیت قابل اطمینان; Public auditing; Identity-based cryptography; Provable security; Bilinear pairing;
Keywords: امنیت قابل اطمینان; Anonymity; Handover authentication; Protocol; Provable security; Wireless network; 00-01; 99-00;
Keywords: امنیت قابل اطمینان; Authenticated key agreement; Identity-based cryptography; Provable security; Diffie-Hellman assumption; The extended Canetti-Krawczyk model;
Keywords: امنیت قابل اطمینان; Hash function; Compression algorithm; Non-iterative structure; Provable security; Birthday attack; Meet-in-the-middle attack;
Keywords: امنیت قابل اطمینان; Cloud storage; Data integrity; Algebraic signature; Provable security
Keywords: امنیت قابل اطمینان; Key agreement; Explicit authenticated key agreement; Password-based authentication; Provable security; Impersonation attack
Keywords: امنیت قابل اطمینان; Big Data; Confidentiality; Authenticity; Generalized signcryption; Provable security; Standard model
Keywords: امنیت قابل اطمینان; Implicit authentication; User privacy; Homomorphic encryption; Provable security; Behavioural features94A60; 94A62; 68P25
Keywords: امنیت قابل اطمینان; Concurrent signature; Fair exchange; Ambiguity; Anonymity; Accountability; Provable security; Multi-user setting
Keywords: امنیت قابل اطمینان; Post-Quantum Cryptography; Multivariate Public Key Cryptography; Isomorphism of Polynomials; Proxy signature; Provable security;
Keywords: امنیت قابل اطمینان; Three-party authenticated key agreement; Smart card; Provable security; Random oracle model
Keywords: امنیت قابل اطمینان; Cloud storage; Data integrity; Identity-based signature; Provable security
D-NTRU: More efficient and average-case IND-CPA secure NTRU variant
Keywords: امنیت قابل اطمینان; Public key cryptography; NTRU; Provable security; Lattice-based cryptography; Average-case security;
Security levels in steganography - Insecurity does not imply detectability
Keywords: امنیت قابل اطمینان; Steganography; Covertext channels; Provable security; Distribution learning;
A strong provably secure IBE scheme without bilinear map
Keywords: امنیت قابل اطمینان; Identity-based encryption; Bilinear map; Provable security; Combined public-key scheme
IND-CCA secure encryption based on a Zheng-Seberry scheme
Keywords: امنیت قابل اطمینان; Public key cryptography; Zheng-Seberry encryption scheme; Schnorr signature; Provable security; Random oracle model;
Security of permutation-based compression function lp231lp231
Keywords: امنیت قابل اطمینان; Cryptography; Hash function; Collision resistance; Preimage resistance; Random permutation model; Provable security
On the provably secure CEW based on orthogonal decomposition
Keywords: امنیت قابل اطمینان; Commutative Encryption and Watermarking (CEW); Orthogonal decomposition; Provable security
Broadcast encryption based non-interactive key distribution in MANETs
Keywords: امنیت قابل اطمینان; Key distribution; Broadcast encryption; Identity based; Provable security; Ad hoc network
Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks
Keywords: امنیت قابل اطمینان; Handoff authentication; Handover authentication; Double-trapdoor chameleon hashing; Provable security; Perfect backward secrecy; Wireless network;
New identity-based three-party authenticated key agreement protocol with provable security
Keywords: امنیت قابل اطمینان; Information security; Authentication; Key agreement; Three-party; Identity-based; Provable security
Sharing many secrets with computational provable security
Keywords: امنیت قابل اطمینان; Multi-secret sharing schemes; Provable security; Symmetric encryption; Cryptography
Certificateless threshold signature secure in the standard model
Keywords: امنیت قابل اطمینان; Certificateless cryptography; Threshold signature; Provable security; Standard model
Escrowable identity-based authenticated key agreement protocol with strong security
Keywords: امنیت قابل اطمینان; Authenticated key agreement; Identity-based cryptography; Provable security; Bilinear Diffie–Hellman assumption; Key escrow
Efficient and dynamic key management for multiple identities in identity-based systems
Keywords: امنیت قابل اطمینان; Identity-based key management; Provable security; Information security
Identity-based online/offline signcryption for low power devices
Keywords: امنیت قابل اطمینان; Low power devices; Identity-based cryptography; Online/offline signcryption; Bilinear pairings; Provable security
An efficient remote user authentication and key agreement protocol for mobile client–server environment from pairings
Keywords: امنیت قابل اطمینان; ID-based; Mutual authentication; Key agreement; Bilinear pairing; Mobile device; Provable security
Provably secure proxy signature scheme from factorization
Keywords: امنیت قابل اطمینان; Cryptography; Signature; Proxy signature; Integer factorization; Provable security
Provably secure three-party password authenticated key exchange protocol in the standard model
Keywords: امنیت قابل اطمینان; Standard model; 3PAKE; Provable security; Dictionary attack; Unknown key-share attack; Password-compromise impersonation attack
Certificateless undeniable signatures from bilinear maps
Keywords: امنیت قابل اطمینان; Certificateless public-key cryptography; Undeniable signature; Random oracle model; Provable security; Bilinear maps
Improved certificateless multi-proxy signature
Keywords: امنیت قابل اطمینان; certificateless; multi-proxy signature; provable security; bilinear map;
An efficient certificateless two-party authenticated key agreement protocol
Keywords: امنیت قابل اطمینان; Certificateless cryptography; Authenticated key agreement; Provable security; Bilinear pairings; Elliptic curve
Efficient certificateless proxy signature scheme with provable security
Keywords: امنیت قابل اطمینان; Proxy signature; Certificateless signature; Certificateless proxy signature; Delegation; Provable security
Certifying assembly with formal security proofs: The case of BBS
Keywords: امنیت قابل اطمینان; Hoare logic; Assembly language; Coq; PRNG; Provable security
An efficient non-interactive deniable authentication scheme based on trapdoor commitment schemes
Keywords: امنیت قابل اطمینان; Deniable authentication; Trapdoor commitment; Provable security
Improved convertible authenticated encryption scheme with provable security
Keywords: امنیت قابل اطمینان; Cryptography; Convertible; Authenticated encryption; ElGamal system; Provable security; Random oracle model
Provably secure multi-proxy signature scheme with revocation in the standard model
Keywords: امنیت قابل اطمینان; Digital signature; Multi-proxy; Provable security; Standard model; Bilinear pairings
An efficient identity based generalized signcryption scheme
Keywords: امنیت قابل اطمینان; Signcryption; Generalized signcryption; Identity based cryptography; Provable security;
Provable secure authentication protocol with anonymity for roaming service in global mobility networks
Keywords: امنیت قابل اطمینان; Authentication; Anonymity; Wireless roaming; Provable security
A new two-round certificateless authenticated key agreement protocol without bilinear pairings
Keywords: امنیت قابل اطمینان; Certificateless cryptography; Authenticated key agreement; Provable security; Bilinear pairings; Elliptic curve
Provably secure identity-based authenticated key agreement protocols with malicious private key generators
Keywords: امنیت قابل اطمینان; Authenticated key agreement; Man-in-the-middle attacks; ID-based systems; Provable security
Provably secure hybrid key agreement protocols in cluster-based wireless ad hoc networks
Keywords: امنیت قابل اطمینان; Clustering; Provable security; Wireless ad hoc networks; Group key agreement; Key distribution
Provably secure authenticated key exchange protocol under the CDH assumption
Keywords: امنیت قابل اطمینان; Cryptography; Authenticated key exchange; Provable security; eCK model; Key confirmation
A provably secure secret handshake with dynamic controlled matching
Keywords: امنیت قابل اطمینان; Applied cryptography; Secret handshakes; Untraceability; Unlinkability; Provable Security