Showing
1 - 10
results of
10
for search '
CHEN, Kefei
'
Skip to content
AUNILO IRDS | AUNILO Institutional Repository Discovery Service
FAQs
|
Search Tips
|
Feedback
Your Account
Log Out
Login
Theme
Bootstrap
Aunilo
Language
English
中文(繁體)
اللغة العربية
Toggle navigation
Home
Search/Browse Options
Search History
Advanced Search
About
About AUNILO IRDS
Content Sources
Statistics
Technical Team
Disclaimer
Privacy & Security Policy
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
CHEN, Kefei
Showing
1 - 10
results of
10
for search '
CHEN, Kefei
'
, query time: 0.11s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
A Generic Construction of Accountable Decryption and Its Applications
by
ZHOU, Xuhua
,
DING, Xuhua
,
CHEN
,
Kefei
Published 2012
Get full text
Get full text
text
Save to List
Saved in:
2
Lightweight Delegated Subset Test with Privacy Protection
by
ZHOU, Xuhua
,
DING, Xuhua
,
CHEN
,
Kefei
Published 2011
Get full text
Get full text
text
Save to List
Saved in:
3
Multiplex Encryption a Practical Approach to Encrypting Multi-Recipient Emails
by
DING, Xuhua
,
Wei, Wei
,
CHEN
,
Kefei
Published 2005
Get full text
Get full text
text
Save to List
Saved in:
4
Rights Protection for Data Cubes
by
GUO, Jie
,
LI, Yingjiu
,
DENG, Robert H.
,
CHEN
,
Kefei
Published 2006
Get full text
Get full text
text
Save to List
Saved in:
5
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings
by
Weng, Jian
,
DENG, Huijie, Robert
,
Liu, Shengli
,
Chen
,
Kefei
Published 2010
Get full text
Get full text
text
Save to List
Saved in:
6
Chosen-Ciphertext Secure Proxy Re-Encryption without Pairing
by
DENG, Robert H.
,
Weng, Jian
,
LIU, Shengli
,
CHEN
,
Kefei
Published 2008
Get full text
Get full text
text
Save to List
Saved in:
7
Cryptanalysis of a Hierarchical Identity-based Encryption Scheme
by
WENG, Jian
,
CHEN, Min-Rong
,
CHEN
,
Kefei
,
DENG, Robert H.
Published 2010
Get full text
Get full text
text
Save to List
Saved in:
8
Expressive Search on Encrypted Data
by
LAI, Junzuo
,
ZHOU, Xuhua
,
DENG, Robert H.
,
LI, Yingjiu
,
CHEN
,
Kefei
Published 2013
Get full text
Get full text
text
Save to List
Saved in:
9
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
by
WENG, Jian
,
CHEN, Minrong
,
YANG, Yanjiang
,
DENG, Robert H.
,
CHEN
,
Kefei
Published 2010
Get full text
Get full text
text
Save to List
Saved in:
10
Continuous Non-malleable Key Derivation and its Application to Related-Key Security
by
QIN, Baodong
,
LIU, Shenli
,
YUEN, Tsz Hon
,
DENG, Robert H.
,
CHEN
,
Kefei
Published 2015
Get full text
Get full text
text
Save to List
Saved in:
Search Tools:
Get RSS Feed
—
Email this Search
—
×
Loading...