|
1 |
Escrow-Less Identity-Based Signature Scheme with Outsourced Protection in Cloud Computing Enthalten in Wireless personal communications 2.6.2020: 1-22
|
|
|
2 |
Remove key escrow from the BF and Gentry identity-based encryption with non-interactive key generation Enthalten in Telecommunication systems 14.5.2018: 1-10
|
|
|
3 |
Key-escrow free multi-signature scheme using bilinear pairings Enthalten in Groups, complexity, cryptology Bd. 7, 2015, Nr. 1: 47-57. 11 S.
|
|
|
4 |
Escrow Serializability and Reconciliation in Mobile Computing using Semantic Properties Enthalten in International Journal On Advances in Telecommunications Bd. 2, 2009, Nr. 2-3: 72-87
|
|
|
5 |
Cryptography, trusted third parties and escrow Enthalten in British Telecom: BT technology journal Bd. 15, Nr. 2, date:4.1997: 45-62
|
|
|
6 |
Escrow accounts and the value of mortgage servicing contracts Enthalten in Journal of financial services research Bd. 8, Nr. 1, date:2.1994: 59-76
|
|
|
7 |
A provable secure key-escrow-free identity-based signature scheme without using secure channel at the phase of private key issuance Enthalten in Sādhāna Bd. 44, 6.5.2019, Nr. 6, date:6.2019: 1-9
|
|
|
8 |
DBKEM-AACS: a distributed key escrow model in blockchain with anonymous authentication and committee selection Enthalten in Science China / Information sciences Bd. 66, 14.11.2022, Nr. 3, date:3.2023: 1-2
|
|
|
9 |
Enhanced post-quantum key escrow system for supervised data conflict of interest based on consortium blockchain Enthalten in Journal of combinatorial optimization Bd. 45, 3.6.2023, Nr. 5, date:7.2023: 1-25
|
|
|
10 |
QuSigS: A quantum Signcryption scheme to recover key escrow problem and key revocation problem in cloud computing Enthalten in Multimedia tools and applications Bd. 81, 13.8.2022, Nr. 25, date:10.2022: 36781-36803
|
|