-
201
Homomorphic encryption location privacy-preserving scheme based on Markov model
Published 2017-01-01Subjects: Get full text
Article -
202
Research on efficient and secure cross-domain data sharing of IoV under blockchain architecture
Published 2023-03-01Subjects: Get full text
Article -
203
STE-based encrypted relational database scheme with reduced leakages
Published 2024-04-01Subjects: Get full text
Article -
204
A Cryptographic Scheme for Construction of Substitution Boxes Using Quantic Fractional Transformation
Published 2022-01-01Subjects: Get full text
Article -
205
Multi-Smart Meter Data Encryption Scheme Basedon Distributed Differential Privacy
Published 2024-03-01Subjects: Get full text
Article -
206
Trusted secure model for data services in cloud computing
Published 2014-10-01Subjects: Get full text
Article -
207
Lightweight privacy preservation blockchain framework for healthcare applications using GM-SSO
Published 2025-03-01Subjects: Get full text
Article -
208
Research on Security Algorithm for Crossing Heterogeneous Network Based on Unified Communication Technology
Published 2013-12-01Subjects: Get full text
Article -
209
Multi-dimensional secure query scheme for fog-enhanced IIoT
Published 2020-08-01Subjects: Get full text
Article -
210
Enhancing the robustness of block ciphers through a graphical S-box evolution scheme for secure multimedia applications
Published 2024-12-01Subjects: Get full text
Article -
211
An improved Fully Homomorphic Encryption model based on N-Primes
Published 2019-10-01Subjects: Get full text
Article -
212
Multi-server conjunctive keyword searchable encryption scheme based on BDH problem
Published 2020-02-01Subjects: Get full text
Article -
213
Cloud data secure deduplication scheme via role-based symmetric encryption
Published 2018-05-01Subjects: “…role-based symmetric encryption…”
Get full text
Article -
214
The SPN Network for Digital Audio Data Based on Elliptic Curve Over a Finite Field
Published 2022-01-01Subjects: Get full text
Article -
215
Rational-security and fair two-party comparison protocol
Published 2023-12-01Subjects: Get full text
Article -
216
An access control scheme for IoT based on smart contracts and CP-ABE
Published 2024-10-01Subjects: “…ciphertext-policy attribute-based encryption…”
Get full text
Article -
217
Key establish scheme for optical encryption system based on IBE
Published 2012-04-01Subjects: Get full text
Article -
218
Novel hierarchical identity-based encryption scheme from lattice
Published 2017-11-01Subjects: “…hierarchical identity-based encryption…”
Get full text
Article -
219
Conditions for anonymity in some generic public-key encryption constructions
Published 2009-01-01Subjects: Get full text
Article -
220
Research on the programming language for proxy re-encryption
Published 2018-06-01Subjects: “…proxy re-encryption…”
Get full text
Article