-
61
Proxy re-encryption based multi-factor access control scheme in cloud
Published 2018-02-01Subjects: “…proxy re-encryption…”
Get full text
Article -
62
ID-based efficient and proactive threshold proxy signature in the standard model
Published 2011-01-01Subjects: “…proactive threshold proxy signature…”
Get full text
Article -
63
Privacy preserving friend discovery cross domain scheme using re-encryption in mobile social networks
Published 2017-10-01Subjects: Get full text
Article