To search, Click below search items.
All Published Papers Search Service
Title
A New Construction of Short Hierarchical Identity-based Signature in the Standard Model
Author
Leyou Zhang, Yupu Hu
Vol. 9 No. 4 pp. 180-186
Keywords
Hierarchical identity-based signature, the standard model, h-CDH assumption, provably secure
Design a secure composite key-management scheme in Ad-Hoc Networks using Localization
Seyed-Mohsen Ghoreishi, Morteza Analoui
Vol. 9 No. 9 pp. 35-49
PKG, TTP, key-management, Identity-based, certificated-based
A XML based, User-centered Privacy Model in Pervasive Computing Systems
Ali Dehghantanha, Ramlan Mahmod, Nur Izura Udzir
Vol. 9 No. 10 pp. 167-173
privacy, pervasive computing, identity privacy, location privacy, time privacy
Threats of Online Social Networks
Abdullah Al Hasib
Vol. 9 No. 11 pp. 288-293
Online Social Network, Privacy, Profile squatting, Identity threat, Image Tagging and Crossprofiling