-
281
Adaptively secure key-policy ABE scheme with fast decryption
Published 2014-11-01Subjects: “…attribute-based encryption…”
Get full text
Article -
282
Multi-owner accredited keyword search over encrypted data
Published 2017-11-01Subjects: Get full text
Article -
283
Resplittable threshold multi-broker proxy re-encryption scheme from lattices
Published 2017-05-01Subjects: “…proxy re-encryption…”
Get full text
Article -
284
A Survey of Differential Privacy Techniques for Federated Learning
Published 2025-01-01Subjects: “…lattice-based homomorphic encryption…”
Get full text
Article -
285
Data sharing scheme supporting secure outsourced computation in wireless body area network
Published 2017-04-01Subjects: Get full text
Article -
286
Security protection method based on mimic defense and Paillier encryption for smart IoT terminals
Published 2024-12-01Subjects: Get full text
Article -
287
-
288
Protection of personal data under martial law in Ukraine
Published 2023-09-01Subjects: Get full text
Article -
289
Image vaccine against steganography in encrypted domain
Published 2025-02-01Subjects: Get full text
Article -
290
A semi-synchronous federated learning framework with chaos-based encryption for enhanced security in medical image sharing
Published 2025-03-01Subjects: “…Chaos-based encryption…”
Get full text
Article -
291
Enhancing smart healthcare networks: Integrating attribute-based encryption for optimization and anti-corruption mechanisms
Published 2025-01-01Subjects: Get full text
Article -
292
Improved RLCE public key encryption scheme based on Polar codes
Published 2020-10-01Subjects: Get full text
Article -
293
Electronic evidence sharing scheme of Internet of vehicles based on signcryption and blockchain
Published 2021-12-01Subjects: Get full text
Article -
294
Electronic medical records sharing solution based on Hyperledger Fabric
Published 2024-10-01Subjects: Get full text
Article -
295
Proxy re-encryption based multi-factor access control scheme in cloud
Published 2018-02-01Subjects: “…proxy re-encryption…”
Get full text
Article -
296
Double Security Level Protection Based on Chaotic Maps and SVD for Medical Images
Published 2025-01-01Subjects: Get full text
Article -
297
Beyond full‐bit secure authenticated encryption without input‐length limitation
Published 2022-07-01Subjects: “…authenticated encryption…”
Get full text
Article -
298
Wireless sensor security communication and anti-leak locating technology based on region partition in power mobile inspection
Published 2016-02-01Subjects: Get full text
Article -
299
Secure obfuscation for encrypted threshold signatures
Published 2020-06-01Subjects: Get full text
Article -
300
Data privacy preservation for the search of Internet of things based on fine-grained authorization
Published 2017-01-01Subjects: Get full text
Article