Kefei Chen

According to our database1, Kefei Chen authored at least 197 papers between 1995 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
LWR-Based Fully Homomorphic Encryption, Revisited.
Security and Communication Networks, 2018

A new randomized message-locked encryption in the standard model.
Peer-to-Peer Networking and Applications, 2018

Connected Vehicles' Security from the Perspective of the In-Vehicle Network.
IEEE Network, 2018

A Security-Enhanced Identity-Based Batch Provable Data Possession Scheme for Big Data Storage.
TIIS, 2018

Access control encryption with efficient verifiable sanitized decryption.
Inf. Sci., 2018

Efficient identity-based threshold decryption scheme from bilinear pairings.
Frontiers Comput. Sci., 2018

LR-RRA-CCA secure functional encryption for randomized functionalities from trapdoor HPS and LAF.
SCIENCE CHINA Information Sciences, 2018

Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation.
SCIENCE CHINA Information Sciences, 2018

Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits.
Proceedings of the Information Security Practice and Experience, 2018

Revocable Identity-Based Encryption from the Computational Diffie-Hellman Problem.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model.
IEEE Trans. Information Forensics and Security, 2017

Comparable Encryption Scheme over Encrypted Cloud Data in Internet of Everything.
Security and Communication Networks, 2017

Insight of the protection for data security under selective opening attacks.
Inf. Sci., 2017

Generic Construction of Certificate-Based Signature from Certificateless Signature with Provable Security.
Informatica, Lith. Acad. Sci., 2017

Characterizing the semantics of passwords: The role of Pinyin for Chinese Netizens.
Computer Standards & Interfaces, 2017

A new construction on randomized message-locked encryption in the standard model via UCEs.
SCIENCE CHINA Information Sciences, 2017

An efficient pairing-free certificateless signature scheme for resource-limited systems.
SCIENCE CHINA Information Sciences, 2017

Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation.
SCIENCE CHINA Information Sciences, 2017

Cryptanalysis and improvement on anonymous three-factor authentication scheme for mobile networks.
Computers & Electrical Engineering, 2017

An Efficient and Provably Secure Pairing-Free Certificateless Signature Scheme Based on Variant of RSA.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Privacy-Preserving Comparable Encryption Scheme in Cloud Computing.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption.
IEEE Trans. Dependable Sec. Comput., 2016

Fuzzy certificateless signature.
Security and Communication Networks, 2016

Certificateless encryption secure against selective opening attack.
Security and Communication Networks, 2016

Cryptanalysis of a certificateless aggregate signature scheme.
Security and Communication Networks, 2016

A Firewall of Two Clouds: Preserving Outsourced Firewall Policy Confidentiality with Heterogeneity.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Homomorphic Linear Authentication Schemes from (ε)-Authentication Codes.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Efficient revocable identity-based encryption from multilinear maps.
Security and Communication Networks, 2015

n-Evasive all-but-many lossy trapdoor function and its constructions.
Security and Communication Networks, 2015

Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience.
IET Information Security, 2015

Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security.
IACR Cryptology ePrint Archive, 2015

Non-malleability under Selective Opening Attacks: Implication and Separation.
IACR Cryptology ePrint Archive, 2015

Optimal assignment schemes for general access structures based on linear programming.
Des. Codes Cryptography, 2015

Generic Construction of Certificate-Based Encryption from Certificateless Encryption Revisited.
Comput. J., 2015

Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited.
Applied Mathematics and Computer Science, 2015

Continuous Non-malleable Key Derivation and Its Application to Related-Key Security.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

A Modified Efficient Certificateless Signature Scheme without Bilinear Pairings.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015

Non-malleability Under Selective Opening Attacks: Implication and Separation.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
Attribute-based key-insulated signature and its applications.
Inf. Sci., 2014

Efficient identity-based threshold signature scheme from bilinear pairings in standard model.
IJIPT, 2014

PWG: Progressive Weight-Growth Algorithm for LDPC Codes.
IEICE Transactions, 2014

Public-key encryption scheme with selective opening chosen-ciphertext security based on the Decisional Diffie-Hellman assumption.
Concurrency and Computation: Practice and Experience, 2014

Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext.
SCIENCE CHINA Information Sciences, 2014

Proofs of Retrievability Based on MRD Codes.
Proceedings of the Information Security Practice and Experience, 2014

On the Security of a Lattice-Based Multi-party Concurrent Signature Scheme.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

2013
Cryptanalysis and enhancements of efficient three-party password-based key exchange scheme.
Int. J. Communication Systems, 2013

Enhancements of a three-party password-based authenticated key exchange protocol.
Int. Arab J. Inf. Technol., 2013

Proofs of Data Possession and Retrievability Based on MRD Codes.
IACR Cryptology ePrint Archive, 2013

A note on the practical complexity of the NFS in the medium prime case: Smoothness of Norms.
IACR Cryptology ePrint Archive, 2013

Fixing the Sender-Equivocable Encryption Scheme in Eurocrypt 2010.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Secure and Oblivious Information Hiding in Binary Image.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

Leakage-resilient lossy trapdoor functions and public-key encryption.
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013

Expressive search on encrypted data.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
A Secure Lightweight RFID Binding Proof Protocol for Medication Errors and Patient Safety.
J. Medical Systems, 2012

An Efficient Key-Management Scheme for Hierarchical Access Control in E-Medicine System.
J. Medical Systems, 2012

Identity-Based Key-Insulated Signcryption.
Informatica, Lith. Acad. Sci., 2012

Analysis for REPERA: A Hybrid Data Protection Mechanism in Distributed Environment.
IJCAC, 2012

On the Equivalence between the Set Covering Problem and the Problem of Finding Optimal Cumulative Assignment Schemes.
IACR Cryptology ePrint Archive, 2012

Optimal Multiple Assignments with (m, m)-Scheme for General Access Structures.
IACR Cryptology ePrint Archive, 2012

Efficient identity-based threshold signature scheme from bilinear pairings in the standard model.
IACR Cryptology ePrint Archive, 2012

Efficient identity-based threshold decryption scheme from bilinear pairings.
IACR Cryptology ePrint Archive, 2012

Generic Construction of Certificate Based Encryption from Certificateless Encryption Revisited.
IACR Cryptology ePrint Archive, 2012

Provably Secure Generic Construction of Certificate Based Signature from Certificateless Signature in Standard Model.
IACR Cryptology ePrint Archive, 2012

Accountable authority key policy attribute-based encryption.
SCIENCE CHINA Information Sciences, 2012

Selective Opening Chosen Ciphertext Security Directly from the DDH Assumption.
Proceedings of the Network and System Security - 6th International Conference, 2012

Annihilators of Fast Discrete Fourier Spectra Attacks.
Proceedings of the Advances in Information and Computer Security, 2012

Designated Condition One-Time Signatures.
Proceedings of the Internet and Distributed Computing Systems, 2012

Attack Based on Direct Sum Decomposition against the Nonlinear Filter Generator.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

A Generic Construction of Accountable Decryption and Its Applications.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
Restrictive partially blind signature for resource-constrained information systems.
Knowl. Inf. Syst., 2011

Key updating technique in identity-based encryption.
Inf. Sci., 2011

Self-generated-certificate public key encryption without pairing and its application.
Inf. Sci., 2011

YI Cloud: Improving user privacy with secret key recovery in cloud storage.
Proceedings of the IEEE 6th International Symposium on Service Oriented System Engineering, 2011

Lightweight Delegated Subset Test with Privacy Protection.
Proceedings of the Information Security Practice and Experience, 2011

Homomorphic Linear Authentication Schemes for Proofs of Retrievability.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

2010
Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards.
IEEE Trans. Industrial Electronics, 2010

A Genetic Algorithm Based Clustering Approach with Tabu Operation and K-Means Operation.
J. Intelligent Systems, 2010

Practical Certificateless Aggregate Signatures from Bilinear Maps.
J. Inf. Sci. Eng., 2010

Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings.
Inf. Sci., 2010

Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism.
Inf. Sci., 2010

Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme.
IEICE Transactions, 2010

CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles.
IACR Cryptology ePrint Archive, 2010

CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles.
SCIENCE CHINA Information Sciences, 2010

2009
Fair and Secure Mobile Billing Systems.
Wireless Personal Communications, 2009

When is a key establishment protocol correct?
Security and Communication Networks, 2009

Towards Provable Security for Data Transmission Protocols in Sensor Network.
J. Inf. Sci. Eng., 2009

Receipt-Freeness for Groth e-Voting Schemes.
J. Inf. Sci. Eng., 2009

Provably Secure Identity-based Threshold Key Escrow from Pairing.
I. J. Network Security, 2009

A key management protocol with robust continuity for sensor networks.
Computer Standards & Interfaces, 2009

Secure multiple-times proxy signature scheme.
Computer Standards & Interfaces, 2009

Democratic group signatures with collective traceability.
Computers & Electrical Engineering, 2009

A Verified Group Key Agreement Protocol for Resource-Constrained Sensor Networks.
Proceedings of the Web Information Systems and Mining, International Conference, 2009

Efficient Secure Multiparty Computation Protocol in Asynchronous Network.
Proceedings of the Advances in Information Security and Assurance, 2009

How to Break LU Matrix Based Key Predistribution Schemes for Wireless Sensor Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Extended PEG Algorithm for High Rate LDPC Codes.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

Bitwise Higher Order Differential Cryptanalysis.
Proceedings of the Trusted Systems, First International Conference, 2009

A game controller based on multiple sensors.
Proceedings of the International Conference on Advances in Computer Entertainment Technology, 2009

2008
Identity-Based Parallel Key-Insulated Signature Without Random Oracles.
J. Inf. Sci. Eng., 2008

A Generic Construction for Instrusion-Resilient Signatures from Linear Feedback Shift Register.
J. Inf. Sci. Eng., 2008

A tabu search approach for the minimum sum-of-squares clustering problem.
Inf. Sci., 2008

Cryptanalysis of LU Decomposition-based Key Pre-distribution Scheme for Wireless Sensor Networks.
IACR Cryptology ePrint Archive, 2008

Democratic Group Signatures with Threshold Traceability.
IACR Cryptology ePrint Archive, 2008

Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings.
IACR Cryptology ePrint Archive, 2008

A synthetic indifferentiability analysis of some block-cipher-based hash functions.
Des. Codes Cryptography, 2008

MOHCS: Towards Mining Overlapping Highly Connected Subgraphs
CoRR, 2008

New Constructions of Permutation Arrays
CoRR, 2008

New Lower Bounds on Sizes of Permutation Arrays
CoRR, 2008

New Upper Bounds on Sizes of Permutation Arrays
CoRR, 2008

Identity-Based Parallel Key-Insulated Signature: Framework and Construction.
Journal of Research and Practice in Information Technology, 2008

A Tamper-Evident Voting Machine Resistant to Covert Channels.
Proceedings of the Provable Security, Second International Conference, 2008

Identity-Based Threshold Key-Insulated Encryption without Random Oracles.
Proceedings of the Topics in Cryptology, 2008

Chosen-Ciphertext Secure Proxy Re-encryption without Pairings.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

2007
Certificateless threshold cryptosystem secure against chosen-ciphertext attack.
Inf. Sci., 2007

Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes.
Informatica, Lith. Acad. Sci., 2007

Code-based Ring Signature Scheme.
I. J. Network Security, 2007

LFSR-based Signatures with Message Recovery.
I. J. Network Security, 2007

Filling the Gap between Voters and Cryptography in e-Voting.
IACR Cryptology ePrint Archive, 2007

A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based Hash Functions.
IACR Cryptology ePrint Archive, 2007

Pirate decoder for the broadcast encryption schemes from Crypto 2005.
Science in China Series F: Information Sciences, 2007

ID-based threshold decryption secure against adaptive chosen-ciphertext attack.
Computers & Electrical Engineering, 2007

Two Certificateless Aggregate Signatures From Bilinear Maps.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Efficient Partially Blind Signature from LFSR.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Protocol Engineering Principles for Cryptographic Protocols Design.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A Receipt-Free Punch-Hole Ballot Electronic Voting Scheme.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

Efficient Receipt-Free Electronic Auction Protocol.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

A Hierarchical Composition of LU Matrix-Based Key Distribution Scheme for Sensor Networks.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007

A Secure Time Synchronization Protocol for Sensor Network.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007

A Framework for Proving the Security of Data Transmission Protocols in Sensor Network.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007

Identity-Based Threshold Decryption Revisited.
Proceedings of the Information Security Practice and Experience, 2007

Efficient Linkable Ring Signatures and Threshold Signatures from Linear Feedback Shift Register.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2007

Undeniable Mobile Billing Schemes.
Proceedings of the Public Key Infrastructure, 2007

Linkable Ring Signatures from Linear Feedback Shift Register.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

Efficient Blind Signatures from Linear Feedback Shift Register.
Proceedings of the Cooperative Design, 2007

2006
Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing.
Informatica, Lith. Acad. Sci., 2006

Provably Secure Convertible User Designating Confirmer Partially Blind Signatures.
Informatica, Lith. Acad. Sci., 2006

Construction of Dynamic Threshold Decryption Scheme from Pairing.
I. J. Network Security, 2006

Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes.
IACR Cryptology ePrint Archive, 2006

Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i.
IACR Cryptology ePrint Archive, 2006

Comments on a theorem on grid access control.
Future Generation Comp. Syst., 2006

Comments on an access control model in semantic grid.
Future Generation Comp. Syst., 2006

Analysis and improvement of fair certified e-mail delivery protocol.
Computer Standards & Interfaces, 2006

An Improved Hybrid Genetic Clustering Algorithm.
Proceedings of the Advances in Artificial Intelligence, 4th Helenic Conference on AI, 2006

Rights Protection for Data Cubes.
Proceedings of the Information Security, 9th International Conference, 2006

A Practical Clumped-Tree Multicast Encryption Scheme.
Proceedings of the Information Security Practice and Experience, 2006

A Non-committing Encryption Scheme Based on Quadratic Residue.
Proceedings of the Computer and Information Sciences, 2006

Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction.
Proceedings of the Progress in Cryptology, 2006

A Locally Group Key Management with Revocation and Self-healing Capability for Sensor Networks.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006

Enforcing Trust in Pervasive Computing with Trusted Computing Technology.
Proceedings of the Critical Information Infrastructures Security, 2006

Efficient Partially Blind Signature Scheme with Provable Security.
Proceedings of the Computing and Combinatorics, 12th Annual International Conference, 2006

Identity-Based Key-Insulated Signature with Secure Key-Updates.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006

Identity-Based Key-Insulated Signature Without Random Oracles.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
Some new characters on the wire-tap channel of type II.
IEEE Trans. Information Theory, 2005

Efficient Authenticated Encryption Schemes with Public Verifiability
CoRR, 2005

Improvements on the WTLS protocol to avoid denial of service attacks.
Computers & Security, 2005

Identity oriented signature scheme based on quadratic residues.
Applied Mathematics and Computation, 2005

A dynamic threshold commercial key escrow scheme based on conic.
Applied Mathematics and Computation, 2005

ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings.
Applied Mathematics and Computation, 2005

Transitive Signatures Based on Bilinear Maps.
Proceedings of the Security in Information Systems, 2005

An Efficient Asynchronous Proactive RSA Scheme.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

An Efficient Proactive RSA Scheme for Large-Scale Ad Hoc Networks.
Proceedings of the Challenges in Ad Hoc Networking, 2005

A Hybrid Tabu Search Based Clustering Algorithm.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Efficient and Proactive Threshold Signcryption.
Proceedings of the Information Security, 8th International Conference, 2005

An Authentication Protocol for Pervasive Computing.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

A Security Solution of WLAN Based on Public Key Cryptosystem.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Multiplex Encryption: A Practical Approach to Encrypting Multi-recipient Emails.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

An efficient proxy signature scheme in home network DRM.
Proceedings of the ICETE 2005, 2005

Identity Based Conference Key Distribution Scheme from Parings.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

A Tabu Search Based Method for Minimum Sum of Squares Clustering.
Proceedings of the Pattern Recognition and Data Mining, 2005

A Tabu Clustering Method with DHB Operation and Mergence and Partition Operation.
Proceedings of the Discovery Science, 8th International Conference, 2005

A Novel Clustering Technique Based on Improved Noising Method.
Proceedings of the Progress in Pattern Recognition, 2005

Efficient Identity-Based Signatures and Blind Signatures.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

Clustering with Noising Method.
Proceedings of the Advanced Data Mining and Applications, First International Conference, 2005

2004
A genetic clustering method for intrusion detection.
Pattern Recognition, 2004

Authenticating Tripartite Key Agreement Protocol with Pairings.
J. Comput. Sci. Technol., 2004

Asynchronous Proactive RSA.
IACR Cryptology ePrint Archive, 2004

Yet another attack on a password authentication scheme based on quadratic residues with parameters unknown 1.
IACR Cryptology ePrint Archive, 2004

Cryptanalysis of a timestamp-based password authentication scheme.
IACR Cryptology ePrint Archive, 2004

On the orders of transformation matrices (mod n) and two types of generalized arnold transformation matrices.
Science in China Series F: Information Sciences, 2004

Multi-proxy Signature and Proxy Multi-signature Schemes from Bilinear Pairings.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

Digital Image Authentication Based on Turbo Codes.
Proceedings of the Interactive Multimedia and Next Generation Networks: Second International Workshop on Multimedia Interactive Protocols and Systems, 2004

Proxy Structured Multisignature Scheme from Bilinear Pairings.
Proceedings of the Parallel and Distributed Processing and Applications, 2004

SDD: Secure Distributed Diffusion Protocol for Sensor Networks.
Proceedings of the Security in Ad-hoc and Sensor Networks, First European Workshop, 2004

ID-Based Proxy Blind Signature.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

Identity Based Proxy-Signcryption Scheme from Pairings.
Proceedings of the 2004 IEEE International Conference on Services Computing (SCC 2004), 2004

2003
Cryptanalysis of B.Lee-S.Kim-K.Kim Proxy Signature.
IACR Cryptology ePrint Archive, 2003

an attack on a multisignature scheme.
IACR Cryptology ePrint Archive, 2003

Attacks on the (enhanced) Yang-Shieh authentication.
Computers & Security, 2003

On the spectral singularities of watermarked audio.
Proceedings of the 3rd International Conference on WEB Delivering of Music (WEDELMUSIC 2003), 2003

Multimedia Tampering Localization Based on the Perturbation in Reverse Processing.
Proceedings of the Advances in Web-Age Information Management, 2003

On the Noninvertibility of Adaptive Digital Watermarking.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

A Typed Theory for Access Control and Information Flow Control in Mobile Systems.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2002
Multiparty Authentication Services and Key Agreement Protocols with Semi-Trusted Third Party.
J. Comput. Sci. Technol., 2002

Exploiting the Intrinsic Irreversibility of Adaptive Technologies to Enhance the Security of Digital Watermarking.
Proceedings of the Advances in Web-Age Information Management, 2002

A New Offline Privacy Protecting E-cash System with Revokable Anonymity.
Proceedings of the Information Security, 5th International Conference, 2002

Electronic Payment in Mobile Environment.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

1995
Rangabstandscodes und ihre Anwendungen in der Kryptographie.
PhD thesis, 1995

A New Identification Algorithm.
Proceedings of the Cryptography: Policy and Algorithms, 1995


  Loading...