Showing 41 - 60 results of 63 for search '"proxies"', query time: 0.03s Refine Results
  1. 41
  2. 42
  3. 43
  4. 44

    Proxy re-signature scheme based on isomorphisms of polynomial by Hui-xian LI, Lu SHAO, Liao-jun PANG

    Published 2017-02-01
    Subjects: “…proxy re-signature…”
    Get full text
    Article
  5. 45
  6. 46
  7. 47
  8. 48

    SECURING WEB APPLICATIONS WITH OWASP ZAP FOR COMPREHENSIVE SECURITY TESTING by S. P. Maniraj, Chitra Sabapathy Ranganathan, Satheeshkumar Sekar

    Published 2024-12-01
    Subjects: “…zed attack proxy, web application security, vulnerability detection, security testing, threat mitigation.…”
    Get full text
    Article
  9. 49
  10. 50
  11. 51
  12. 52
  13. 53
  14. 54

    RLWE-based ciphertext-policy attribute proxy re-encryption by En ZHANG, Yaoyao PEI, Jiao DU

    Published 2018-11-01
    Subjects: “…proxy re-encryption…”
    Get full text
    Article
  15. 55
  16. 56
  17. 57
  18. 58
  19. 59
  20. 60