-
1
Privacy protection mechanism of on-demand disclosure on blockchain
Published 2020-06-01Subjects: “…anonymous multi receiver encryption scheme…”
Get full text
Article -
2
Fused access control scheme for sensitive data sharing
Published 2014-08-01Subjects: “…data sharing;access control;attribute-based encryption scheme;usage control…”
Get full text
Article -
3
RSA-based image recognizable adversarial attack method
Published 2021-10-01Subjects: Get full text
Article -
4
Provably secure and efficient escrowable public key encryption schemes
Published 2014-07-01Subjects: Get full text
Article -
5
Trusted secure model for data services in cloud computing
Published 2014-10-01Subjects: Get full text
Article -
6
Conditions for anonymity in some generic public-key encryption constructions
Published 2009-01-01Subjects: Get full text
Article -
7
Conditions for anonymity in some generic public-key encryption constructions
Published 2009-01-01Subjects: “…computational cryptography;anonymity;provable security;identity-based encryption scheme;key-privacy…”
Get full text
Article -
8
Fast computation of cyclic convolutions and their applications in code-based asymmetric encryption schemes
Published 2023-12-01Subjects: Get full text
Article -
9
Dynamic Trust-based Access Control with Hybrid Encryption for Secure IoT Applications
Published 2025-05-01Subjects: Get full text
Article -
10
Post-Quantum Key Exchange and Subscriber Identity Encryption in 5G Using ML-KEM (Kyber)
Published 2025-07-01Subjects: “…elliptic curve integrated encrypted scheme…”
Get full text
Article