Ausgabe 1/2016
Special issue: 19th Australasian Conference on Information Security and Privacy (ACISP 2014)
Inhalt (6 Artikel)
Special Issue Paper
Secure three-party computational protocols for triangle area
Liang Liu, Xiaofeng Chen, Wenjing Lou
Special Issue Paper
Sakai–Ohgishi–Kasahara identity-based non-interactive key exchange revisited and more
Yu Chen, Qiong Huang, Zongyang Zhang
Special Issue Paper
Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption
Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, Yan Li
Special Issue Paper
On selection of samples in algebraic attacks and a new technique to find hidden low degree equations
Petr Sušil, Pouyan Sepehrdad, Serge Vaudenay, Nicolas Courtois
Special Issue Paper
Strongly simulation-extractable leakage-resilient NIZK
Yuyu Wang, Keisuke Tanaka
Special Issue Paper
Efficient attribute-based signature and signcryption realizing expressive access structures
Y. Sreenivasa Rao, Ratna Dutta