-
1
Asymmetric proxy re-encryption system achievable for office user to securely sharing outsourcing data of mobile terminal
Published 2016-09-01Subjects: Get full text
Article -
2
Efficient traceable identity-based signature scheme
Published 2009-01-01Subjects: “…identity-based cryptography…”
Get full text
Article -
3
Identity based and key insulated cryptosystem
Published 2009-01-01Subjects: “…identity-based cryptosystem…”
Get full text
Article -
4
Analysis and improvement on identity-based cloud data integrity verification scheme
Published 2018-11-01Subjects: Get full text
Article -
5
Identity-based cloud storage integrity checking from lattices
Published 2019-04-01Subjects: Get full text
Article -
6
Analysis and improvement of an identity-based signature scheme from lattices
Published 2015-05-01Subjects: “…identity-based signature…”
Get full text
Article -
7
Certificate-based hybrid encryption scheme in the standard model
Published 2009-01-01Subjects: Get full text
Article -
8
Identity-based cross-domain authentication scheme in pervasive computing environments
Published 2011-01-01Subjects: Get full text
Article -
9
Identity-based group key management scheme for space networks
Published 2010-01-01Subjects: Get full text
Article -
10
Improved identity based multi-receiver anonymous signcryption scheme
Published 2015-09-01Subjects: Get full text
Article -
11
Identity authentication scheme based on identity-based encryption
Published 2016-06-01Subjects: Get full text
Article -
12
Survey on public key encryption with equality test
Published 2018-11-01Subjects: Get full text
Article -
13
-
14
Identity-based anonymous cloud auditing scheme with compact tags
Published 2022-12-01Subjects: Get full text
Article -
15
Identity-based roaming protocol with anonymity for heterogeneous wireless networks
Published 2010-01-01Subjects: Get full text
Article -
16
Cross-domain authentication scheme based on consortium blockchain
Published 2022-06-01Subjects: Get full text
Article -
17
Novel identity-based fully homomorphic encryption scheme from lattice
Published 2017-05-01Subjects: Get full text
Article -
18
Efficiency identity-based threshold group signature scheme
Published 2009-01-01Subjects: Get full text
Article -
19
Research on wormhole attacks in wireless mesh networks
Published 2011-01-01Subjects: Get full text
Article -
20
Key establish scheme for optical encryption system based on IBE
Published 2012-04-01Subjects: “…identity-based cryptography…”
Get full text
Article