Data security against receiver corruptions: SOA security for receivers from simulatable DEMs

Huang, Zhengan, Lai, Junzuo, Chen, Wenbin, Li, Tong and Xiang, Yang 2019, Data security against receiver corruptions: SOA security for receivers from simulatable DEMs, Information sciences, vol. 471, pp. 201-215, doi: 10.1016/j.ins.2018.08.059.

Attached Files
Name Description MIMEType Size Downloads

Title Data security against receiver corruptions: SOA security for receivers from simulatable DEMs
Author(s) Huang, Zhengan
Lai, Junzuo
Chen, Wenbin
Li, Tong
Xiang, YangORCID iD for Xiang, Yang orcid.org/0000-0001-5252-0831
Journal name Information sciences
Volume number 471
Start page 201
End page 215
Total pages 15
Publisher Elsevier
Place of publication Amsterdam, The Netherlands
Publication date 2019-01
ISSN 0020-0255
Keyword(s) Data security
Selective opening security for receivers
Chosen-ciphertext attacks
Hybrid encryption
Ideal cipher model
Language eng
DOI 10.1016/j.ins.2018.08.059
Field of Research 01 Mathematical Sciences
08 Information and Computing Sciences
09 Engineering
HERDC Research category C1.1 Refereed article in a scholarly journal
Copyright notice ©2018, Elsevier Inc.
Persistent URL http://hdl.handle.net/10536/DRO/DU:30120772

Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 7 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 34 Abstract Views, 0 File Downloads  -  Detailed Statistics
Created: Tue, 16 Apr 2019, 10:15:19 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.