An Efficient Deniable Authenticated Encryption Scheme for Privacy Protection
暂无分享,去创建一个
Hongjie Chen | Yongjian Liao | Shijie Zhou | Wen Huang | Shijie Zhou | Wen Huang | Yongjian Liao | Hongjie Chen
[1] Zhenfu Cao,et al. An improved deniable authentication protocol , 2006, Networks.
[2] Wei-Bin Lee,et al. A novel deniable authentication protocol using generalized ElGamal signature scheme , 2007, Inf. Sci..
[3] Chris Xu,et al. Deniable authentication protocol based on Deffie-Hellman algorithm , 2002 .
[4] Xavier Boyen,et al. Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.
[5] Chunhua Jin,et al. Identity-based deniable authentication for ad hoc networks , 2013, Computing.
[6] Fagen Li,et al. Cryptanalysis and Improvement of Robust Deniable Authentication Protocol , 2012, Wireless Personal Communications.
[7] Ronald Cramer,et al. Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack , 2003, SIAM J. Comput..
[8] Dimitriadis Evangelos,et al. The Quest to Replace Passwords : a Framework for Comparative Evaluation of Web Authentication Schemes , 2016 .
[9] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[10] Jianhua Li,et al. A simple protocol for deniable authentication based on ElGamal cryptography , 2005, Networks.
[11] Lein Harn,et al. Design of generalised ElGamal type digital signature schemes based on discrete logarithm , 1994 .
[12] Frank Stajano. Pico: No More Passwords! , 2011, Security Protocols Workshop.
[13] Zhenfu Cao,et al. Non-interactive deniable authentication protocol based on factoring , 2005, Comput. Stand. Interfaces.
[14] Chris J. Mitchell,et al. Impostor: a single sign-on system for use from untrusted devices , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[15] Fagen Li,et al. Analysis of a mobile payment protocol with outsourced verification in cloud server and the improvement , 2018, Comput. Stand. Interfaces.
[16] Craig Metz,et al. A One-Time Password System , 1996, RFC.
[17] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[18] Arun Ross,et al. From Template to Image: Reconstructing Fingerprints from Minutiae Points , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[19] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[20] Yonatan Aumann,et al. Authentication, Enhanced Security and Error Correcting Codes (Extended Abstract) , 1998, CRYPTO.
[21] Syed Abdul Haq,et al. PERSUASIVE CUED CLICK-POINTS : DESIGN , IMPLEMENTATION , AND EVALUATION OF A KNOWLEDGE-BASED AUTHENTICATION MECHANISM , 2014 .
[22] Daphna Weinshall,et al. Cognitive authentication schemes safe against spyware , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[23] Moni Naor,et al. Concurrent zero-knowledge , 2004, JACM.
[24] Eun-Jun Yoon,et al. Robust Deniable Authentication Protocol , 2010, Wirel. Pers. Commun..
[25] Xiaotie Deng,et al. Deniable authentication protocols , 2001 .
[26] Fagen Li,et al. Efficient Deniably Authenticated Encryption and Its Application to E-Mail , 2016, IEEE Transactions on Information Forensics and Security.
[27] Kent E. Seamons,et al. Simple Authentication for the Web , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[28] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[29] Bin Wang,et al. A non-interactive deniable authentication scheme based on designated verifier proofs , 2009, Inf. Sci..
[30] Zuhua Shao. Efficient deniable authentication protocol based on generalized ElGamal signature scheme , 2004, Comput. Stand. Interfaces.