Index file section C for ijact.bib
Last update: Sun Jan 6 02:01:01 MST 2019
Return to index directory
C
-
CAESAR, 3(3)236--261
-
Cai, Shaoying, 2(1)3--12
-
Cai:2010:AHS, 2(1)3--12
-
call, 2(1)13--22
-
Camellia, 3(1)1--20
-
Camellia, p-, 3(1)1--20
-
Camenisch, Jan, 1(4)320--322
-
Camenisch, Jan, see Ateniese, Giuseppe
-
CaP, 3(4)344--362
-
case, 3(3)225--235
-
CCA-secure, 3(3)288--311
-
CCA-security, 3(3)288--311
-
CCA2, 3(3)262--287
-
cellular, 3(3)225--235
-
certificateless, 1(2)108--119
-
chain, 2(1)3--12
-
Chakraborty, Debrup, 2(3)271--287
-
Chakraborty:2012:DCM, 2(3)271--287
-
challenge-response, 1(1)32--46
-
Chan, Aldar C.-F., 3(1)21--46
-
Chang, Donghoon, 3(3)236--261, 3(3)262--287
-
Chang, Donghoon, see Agrawal, Megha,
see Bansal, Tarun Kumar
-
channel, 2(2)121--138
-
Chatterjee, Sanjit, 3(1)47--83
-
Chatterjee:2013:PHH, 3(1)47--83
-
checking, 3(3)196--209
-
Chosen-prefix, 2(4)322--359
-
Choudhary, Ashish, 1(3)200--224
-
Choudhary, Ashish, see Patra, Arpita
-
Choudhury, Ashish, 2(2)159--197
-
Choudhury, Ashish, see Patra, Arpita
-
Chowdhury, Dipanwita Roy, 3(3)225--235
-
Chowdhury, Dipanwita Roy, see Ghosh, Shamit
-
cipher, 1(3)161--168, 2(1)60--67, 3(1)1--20
-
ciphertext, 2(1)46--59, 2(3)271--287, 3(3)210--224, 3(3)236--261
-
ciphertext-policy, 2(1)46--59
-
Ciss, Abdoul Aziz, 2(4)360--365
-
Ciss:2012:REE, 2(4)360--365
-
Clear, Michael, 3(4)363--376
-
Clear:2017:ABF, 3(4)363--376
-
Cliff, Yvonne, 1(3)181--199
-
Cliff, Yvonne, see Boyd, Colin
-
cloning, 2(3)250--270
-
cloud, 3(3)196--209
-
collisions, 2(4)322--359
-
commit-and-prove, 3(4)344--362
-
committing, non-, 2(3)229--249
-
common, 3(4)344--362
-
compared, 1(1)3--21
-
Comparing, 1(3)236--250
-
comparison, 1(1)22--31, 1(4)323--324, 3(2)166--180
-
complete, 3(3)288--311
-
complete, NP-, 3(4)344--362
-
composability, 1(1)70--77
-
composable, 2(3)229--249
-
composite-order, 3(3)288--311
-
compromise, 3(4)377--393
-
computation, 3(1)21--46
-
computing, 3(1)21--46
-
confirmation, 2(2)100--120
-
consoles, 2(3)212--228
-
constant, 2(1)46--59
-
constant-cost, 1(2)79--90
-
constrained, 3(3)236--261
-
content, 1(3)169--180
-
correction, 1(4)323--324
-
corruptions, 1(2)91--107
-
cost, constant-, 1(2)79--90
-
countermeasure, 3(3)225--235
-
Cremers, Cas J. F., 2(2)83--99
-
Cremers:2010:SSS, 2(2)83--99
-
critical, 1(3)169--180
-
CRS, 3(4)344--362
-
cryptanalysis, 2(1)60--67, 3(4)313--329
-
cryptographic, 3(3)236--261
-
cryptography, 1(2)108--119
-
curve, 2(3)212--228, 2(4)360--365, 3(2)139--147