X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (5361) 5361
Newspaper Article (3868) 3868
Conference Proceeding (3837) 3837
Magazine Article (768) 768
Book Chapter (494) 494
Book / eBook (487) 487
Publication (429) 429
Trade Publication Article (400) 400
Dissertation (249) 249
Government Document (98) 98
Web Resource (80) 80
Report (61) 61
Newsletter (60) 60
Transcript (52) 52
Book Review (28) 28
Reference (28) 28
Patent (17) 17
Paper (13) 13
Standard (7) 7
Journal / eJournal (1) 1
Technical Report (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
public key infrastructure (3865) 3865
data encryption (3358) 3358
encryption (2789) 2789
public key (2712) 2712
cryptography (2063) 2063
computer security (1604) 1604
public key cryptography (1588) 1588
security (1561) 1561
computer science (1301) 1301
inventors (1232) 1232
public key encryption (1208) 1208
privacy (1204) 1204
authentication (1040) 1040
digital signatures (1027) 1027
network security (1012) 1012
internet (1006) 1006
computer science, information systems (982) 982
algorithms (895) 895
cloud computing (810) 810
data security (796) 796
identity-based encryption (782) 782
engineering, electrical & electronic (781) 781
computer science, theory & methods (741) 741
analysis (677) 677
telecommunications (672) 672
protocols (667) 667
access control (658) 658
servers (618) 618
public-key encryption (576) 576
information technology (564) 564
software (543) 543
usage (535) 535
computer communication networks (528) 528
verschlüsselung (526) 526
index medicus (525) 525
information security (524) 524
patents (507) 507
public-key-kryptosystem (504) 504
methods (457) 457
research (448) 448
internet of things (445) 445
humans (444) 444
communication (429) 429
medicine & public health (429) 429
computers (425) 425
electronic commerce (415) 415
safety and security measures (414) 414
wireless networks (409) 409
studies (389) 389
management (384) 384
public safety (377) 377
standards (372) 372
public health (371) 371
digital certificates (369) 369
computer software industry (359) 359
elliptic curve cryptography (346) 346
computer networks (336) 336
computer science, hardware & architecture (336) 336
security management (328) 328
computer science, software engineering (318) 318
protection (316) 316
management of computing and information systems (302) 302
mathematics (299) 299
computer information security (297) 297
öffentlicher schlüssel (289) 289
protocol (285) 285
national security (279) 279
rsa (279) 279
information systems (278) 278
public policy (277) 277
engineering (276) 276
public sector (270) 270
communications engineering, networks (268) 268
cryptanalysis (260) 260
receivers (250) 250
law enforcement (248) 248
cryptographic protocols (247) 247
mathematics, applied (247) 247
scheme (245) 245
coding and information theory (242) 242
electronic books (242) 242
data integrity (239) 239
algorithm analysis and problem complexity (238) 238
polynomials (226) 226
hardware (220) 220
networks (220) 220
confidentiality (218) 218
secure (217) 217
public administration (216) 216
medical informatics (214) 214
health informatics (213) 213
social networks (213) 213
wireless sensor networks (212) 212
elliptic curves (207) 207
automation (206) 206
computer systems (205) 205
computation (204) 204
public-key cryptography (203) 203
united states (201) 201
health care sciences & services (198) 198
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Robarts - Stacks (146) 146
Online Resources - Online (90) 90
Collection Dvlpm't (Acquisitions) - Vendor file (62) 62
UofT at Mississauga - Stacks (60) 60
Gerstein Science - Stacks (46) 46
UTL at Downsview - May be requested (44) 44
Engineering & Comp. Sci. - Stacks (42) 42
UofT at Scarborough - Stacks (36) 36
Collection Dvlpm't (Acquisitions) - Closed Orders (25) 25
Law (Bora Laskin) - Stacks (22) 22
St. Michael's College (John M. Kelly) - 2nd Floor (16) 16
Faculty of Information - Stacks (14) 14
Trinity College (John W Graham) - Stacks (10) 10
Victoria University E.J. Pratt - Stacks (8) 8
Architecture Landscape (Shore + Moffat) - Stacks (4) 4
Faculty of Information - May be requested in 6-10 wks (4) 4
Mathematical Sciences - Stacks (3) 3
OISE - Stacks (3) 3
Providence Healthcare - Stacks (3) 3
Robarts - Government Pubs (3) 3
Criminology - Reference (2) 2
Engineering & Comp. Sci. - May be requested in 6-10 wks (2) 2
Gerstein Science - Reference (2) 2
Holland Bloorview Kids Rehabilitation - Stacks (2) 2
Innis College - Stacks (2) 2
Law (Bora Laskin) - Closed Orders (2) 2
New College (Ivey) - Stacks (2) 2
Robarts - Reference (2) 2
UofT at Mississauga - Reference (2) 2
Baycrest Hospital - Stacks (1) 1
Business (Joseph L Rotman) - Stacks (1) 1
Engineering & Comp. Sci. - Missing (1) 1
Engineering & Comp. Sci. - Reference (1) 1
Faculty of Information - Reference (1) 1
Gerstein Science - Not Returned (1) 1
Law (Bora Laskin) - Reserve desk (1) 1
Law (Bora Laskin) - Theses (1) 1
Media Commons - Microtexts (1) 1
Media Commons - Storage (1) 1
Regis College - Stacks (1) 1
Robarts - Course Reserves (1) 1
Robarts - Gov Pub Storage: Request at Reference Desk 4th floor (1) 1
Robarts - May be requested in 6-10 wks (1) 1
Royal Ontario Museum - Stacks (1) 1
Scarborough Hospital - General (1) 1
Scarborough Hospital - Stacks (1) 1
St. Michael's College (John M. Kelly) - Reference (1) 1
Toronto East General Hospital - Stacks (1) 1
University Archives - Archives (1) 1
University College (Laidlaw) - May be requested in 6-10 wks (1) 1
UofT Schools - Stacks (1) 1
UofT at Mississauga - May be requested in 6-10 wks (1) 1
UofT at Scarborough - May be requested (1) 1
UofT at Scarborough - Not returned (1) 1
UofT at Scarborough - Withdrawn (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (14819) 14819
Japanese (132) 132
Chinese (87) 87
German (31) 31
Spanish (20) 20
Korean (18) 18
French (15) 15
Czech (4) 4
Russian (4) 4
Arabic (3) 3
Turkish (3) 3
Portuguese (2) 2
Danish (1) 1
Dutch (1) 1
Italian (1) 1
Urdu (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Journal Article
SIAM Journal on Computing, ISSN 0097-5397, 2014, Volume 43, Issue 2, pp. 831 - 871
Journal Article
IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, 08/2013, Volume 8, Issue 8, pp. 1343 - 1354
Journal Article
IEEE Transactions on Computers, ISSN 0018-9340, 02/2015, Volume 64, Issue 2, pp. 425 - 437
Journal Article
Information Sciences, ISSN 0020-0255, 07/2018, Volume 453, pp. 364 - 378
•WBSE provides a new approach to solve a challenging problem, namely how to resist the keyword guessing attack in the public-key searchable encryption by a... 
Keyword guessing attack | Witness relation | Smooth projective hash function | Searchable encryption | PUBLIC-KEY ENCRYPTION | KEYWORD GUESSING ATTACKS | COMPUTER SCIENCE, INFORMATION SYSTEMS | SECURE | RANDOM ORACLE | SCHEMES | Computer science
Journal Article
Information Sciences, ISSN 0020-0255, 09/2018, Volume 462, pp. 76 - 92
In this paper, we present the concept of certificateless public key encryption with equality test (CL-PKEET), which integrates certificateless public key... 
Authorization | Key escrow | Certificateless public key encryption | Equality test | PAIRINGS | COMPUTER SCIENCE, INFORMATION SYSTEMS | IDENTITY-BASED ENCRYPTION | KEYWORD SEARCH | Computer science | Equality | Cryptography | Analysis
Journal Article
Information Sciences, ISSN 0020-0255, 12/2016, Volume 373, pp. 419 - 440
Public key encryption with equality test (PKEET), which was first introduced by Yang et al. (CT-RSA, 2010), has various applications including facilitating... 
Identity-based encryption | Equality test | Random oracle model | Public key encryption | SEARCHABLE ENCRYPTION | COMPUTER SCIENCE, INFORMATION SYSTEMS | AUTHORIZATION | Hardness | Equality | Medical records | Cloud computing | Partitioning | Searching | Construction methods | Encryption | Internet | Security
Journal Article
ACM Computing Surveys (CSUR), ISSN 0360-0300, 09/2018, Volume 51, Issue 4, pp. 1 - 35
Journal Article
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2009, Volume 5479, pp. 224 - 241
Conference Proceeding
Information Sciences, ISSN 0020-0255, 07/2013, Volume 238, pp. 221 - 241
The notion of public key encryption with keyword search (PEKS) was put forth by Boneh et al. to enable a server to search from a collection of encrypted emails... 
Public key encryption with keyword search | Without random oracle | Keyword guessing attack | SCHEME | COMPUTER SCIENCE, INFORMATION SYSTEMS | SUBSET | IBE
Journal Article
Proceedings of the 17th ACM conference on computer and communications security, ISSN 1543-7221, 10/2010, pp. 463 - 472
In this work, we put forward the notion of Worry-Free Encryption. This allows Alice to encrypt confidential information under Bob's public key and send it to... 
public key cryptography | functional encryption | Public key cryptography | Functional encryption
Conference Proceeding
Information Sciences, ISSN 0020-0255, 07/2018, Volume 453, pp. 111 - 126
Public key encryption with equality test (PKEET) allows the cloud server to test whether two ciphertexts are generated on the same message. Recently, Lee... 
Signcryption | Cloud computing | Generic construction | Public key encryption with equality test | COMPUTER SCIENCE, INFORMATION SYSTEMS | Genetic construction | AUTHORIZATION | Computer science | Equality
Journal Article
Lecture Notes in Computer Science, ISSN 0302-9743, 2005, Volume 3494, pp. 114 - 127
We present the first efficient Identity-Based Encryption (IBE) scheme that is fully secure without random oracles. We first present our IBE construction and... 
SIGNATURES | SECURE | COMPUTER SCIENCE, THEORY & METHODS
Conference Proceeding
IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, 03/2015, Volume 10, Issue 3, pp. 458 - 470
Journal Article
Information Sciences, ISSN 0020-0255, 2010, Volume 180, Issue 13, pp. 2576 - 2587
We introduce a new cryptographic primitive, called proxy re-encryption with keyword search, which is motivated by the following scenario in email systems:... 
mDBDH | Proxy re-encryption with keyword search | Public key encryption with keyword search | Random oracle model | Proxy re-encryption | COMPUTER SCIENCE, INFORMATION SYSTEMS | IDENTITY-BASED ENCRYPTION | Email | Mail | Searching | Polyetherketones | Electronic mail | Cryptography | Servers | Proxy client servers
Journal Article
IEEE Transactions on Computers, ISSN 0018-9340, 01/2015, Volume 64, Issue 1, pp. 126 - 138
Journal Article