-
21
Provably secure certificate less blind proxy re-signatures
Published 2012-09-01Subjects: Get full text
Article -
22
Foraminiferal test dissolution reveals severe sediment acidification in estuarine mudflats: new perspectives for present and historical assessment
Published 2024-07-01Subjects: “…Sediment acidification proxy…”
Get full text
Article -
23
Addressing the conundrum of unavailable name-bearing types
Published 2012-12-01Subjects: Get full text
Article -
24
Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing
Published 2022-06-01Subjects: Get full text
Article -
25
Design and implementation of routing strategy based on terminal trust
Published 2016-04-01Subjects: Get full text
Article -
26
Integrity checking protocol with identity-based proxy signature in mobile cloud computing
Published 2015-10-01Subjects: Get full text
Article -
27
Verifiable federated aggregation method based on homomorphic proxy re-authentication
Published 2024-06-01Subjects: Get full text
Article -
28
Design and performance analysis of a SDN-based intelligent and collaborative Honeynet for mobile networks environment
Published 2018-11-01Subjects: Get full text
Article -
29
Partially blind proxy re-signature scheme with proven security
Published 2018-02-01Subjects: “…partially blind proxy re-signature…”
Get full text
Article -
30
Cache prefetching strategy based on selective Markov model
Published 2010-01-01Subjects: Get full text
Article -
31
Bioinformatic approach to explain how Mg from seawater may be incorporated into coral skeletons
Published 2025-01-01Subjects: Get full text
Article -
32
Research on the programming language for proxy re-encryption
Published 2018-06-01Subjects: “…proxy re-encryption…”
Get full text
Article -
33
Performance Analysis of Proxy-Based Object-Oriented Distributed Systems Using Game Theory
Published 2022-03-01Subjects: Get full text
Article -
34
Constructing fair-exchange protocols for cloud computing
Published 2013-03-01Subjects: Get full text
Article -
35
Dual-proxy key-based threshold signature scheme for ship ad-hoc network
Published 2018-07-01Subjects: Get full text
Article -
36
Electronic medical record data sharing scheme based on searchable encryption via consortium blockchain
Published 2020-08-01Subjects: Get full text
Article -
37
Efficient chosen-ciphertext secure proxy re-encryption scheme
Published 2013-07-01Subjects: “…proxy re-encryption…”
Get full text
Article -
38
Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application
Published 2021-03-01Subjects: Get full text
Article -
39
Attribute-based proxy signature scheme for unmanned aerial vehicle networks
Published 2021-11-01Subjects: Get full text
Article -
40