All Stories

  1. Public key authenticated encryption with keyword search: revisited
  2. Secret image sharing scheme with hierarchical threshold access structure