-
121
Verifiable outsourced attribute-based encryption with access update
Published 2019-02-01Subjects: “…attribute-based encryption…”
Get full text
Article -
122
-
123
Efficient and privacy-preserving online face authentication scheme
Published 2020-05-01Subjects: Get full text
Article -
124
Multi-keyword searchable encryption scheme based on dynamic cuckoo filter
Published 2024-10-01Subjects: “…searchable encryption…”
Get full text
Article -
125
Encryption of 3D or Higher-Dimensional Images: A Review
Published 2024-12-01Subjects: “…image encryption…”
Get full text
Article -
126
Identity authentication scheme based on identity-based encryption
Published 2016-06-01Subjects: Get full text
Article -
127
A Survey of Efficient Lightweight Cryptography for Power-Constrained Microcontrollers
Published 2024-12-01Subjects: Get full text
Article -
128
Reversible digital watermarking-based protocol for data integrity in wireless sensor network
Published 2018-03-01Subjects: Get full text
Article -
129
Fusion of satellite-ground and inter-satellite AKA protocols for double-layer satellite networks
Published 2023-02-01Subjects: Get full text
Article -
130
Research on attribute-based encryption with keyword search for cloud storage
Published 2017-11-01Subjects: “…searchable encryption…”
Get full text
Article -
131
Cryptanalysis of a hybrid-structured onion routing scheme
Published 2013-04-01Subjects: Get full text
Article -
132
Privacy protection mechanism of on-demand disclosure on blockchain
Published 2020-06-01Subjects: “…anonymous multi receiver encryption scheme…”
Get full text
Article -
133
Fingerprint template protection by adopting random projection based on re-encryption
Published 2018-02-01Subjects: Get full text
Article -
134
Time based incremental backup scheme for mobile cloud computing
Published 2016-08-01Subjects: Get full text
Article -
135
Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain
Published 2022-08-01Subjects: Get full text
Article -
136
Generating Encrypted Document Index Structure Using Tree Browser
Published 2023-06-01Subjects: Get full text
Article -
137
Convolutional neural network model over encrypted data based on functional encryption
Published 2024-03-01Subjects: Get full text
Article -
138
Attribute-based encryption scheme with efficient revocation in data outsourcing systems
Published 2015-10-01Subjects: Get full text
Article -
139
Research on color QR code watermarking technology based on chaos theory
Published 2018-07-01Subjects: Get full text
Article -
140
Data security for internet plus in public cloud
Published 2017-10-01Subjects: Get full text
Article