-
21
Cache prefetching strategy based on selective Markov model
Published 2010-01-01Subjects: Get full text
Article -
22
Bioinformatic approach to explain how Mg from seawater may be incorporated into coral skeletons
Published 2025-01-01Subjects: Get full text
Article -
23
Research on the programming language for proxy re-encryption
Published 2018-06-01Subjects: “…proxy re-encryption…”
Get full text
Article -
24
Performance Analysis of Proxy-Based Object-Oriented Distributed Systems Using Game Theory
Published 2022-03-01Subjects: Get full text
Article -
25
Constructing fair-exchange protocols for cloud computing
Published 2013-03-01Subjects: Get full text
Article -
26
Dual-proxy key-based threshold signature scheme for ship ad-hoc network
Published 2018-07-01Subjects: Get full text
Article -
27
Electronic medical record data sharing scheme based on searchable encryption via consortium blockchain
Published 2020-08-01Subjects: Get full text
Article -
28
Efficient chosen-ciphertext secure proxy re-encryption scheme
Published 2013-07-01Subjects: “…proxy re-encryption…”
Get full text
Article -
29
Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application
Published 2021-03-01Subjects: Get full text
Article -
30
Attribute-based proxy signature scheme for unmanned aerial vehicle networks
Published 2021-11-01Subjects: Get full text
Article -
31
-
32
Naval fleet across-domain communication scheme based on CP-ABE
Published 2015-11-01Subjects: Get full text
Article -
33
Probabilistic Solar Proxy Forecasting With Neural Network Ensembles
Published 2023-09-01Subjects: Get full text
Article -
34
Proxy caching algorithm based on segment popularity for mobile streaming media
Published 2007-01-01Subjects: Get full text
Article -
35
Proxy re-signature scheme based on isomorphisms of polynomial
Published 2017-02-01Subjects: “…proxy re-signature…”
Get full text
Article -
36
Encrypted image retrieval in multi-key settings based on edge computing
Published 2020-04-01Subjects: Get full text
Article -
37
Asymmetric proxy re-encryption system achievable for office user to securely sharing outsourcing data of mobile terminal
Published 2016-09-01Subjects: “…proxy re-encryption…”
Get full text
Article -
38
A basin‐wide carbon‐related proxy dataset in arid China
Published 2025-01-01Subjects: Get full text
Article -
39
SECURING WEB APPLICATIONS WITH OWASP ZAP FOR COMPREHENSIVE SECURITY TESTING
Published 2024-12-01Subjects: “…zed attack proxy, web application security, vulnerability detection, security testing, threat mitigation.…”
Get full text
Article -
40
Achieving efficient dynamic cryptographic access control in cloud storage
Published 2011-01-01Subjects: Get full text
Article