-
1
Design and implementation of proxy-protected proxy signature based on SM2
Published 2017-09-01Subjects: Get full text
Article -
2
Privacy matching-based service proxy discovery scheme
Published 2016-08-01Subjects: “…proxy…”
Get full text
Article -
3
Resplittable threshold multi-broker proxy re-encryption scheme from lattices
Published 2017-05-01Subjects: “…proxy re-encryption…”
Get full text
Article -
4
-
5
US – Iran Proxy War in Middle East Under Trump Administration
Published 2021-07-01Subjects: Get full text
Article -
6
Secure deduplication and integrity audit system based on convergent encryption for cloud storage
Published 2017-11-01Subjects: Get full text
Article -
7
Concept and Significance of Criminalistics Classification of Crimes Related to Proxy Battle
Published 2019-09-01Subjects: Get full text
Article -
8
Marriage by Proxy: A Remedy to Divorce and Single Parenting as Presented in Ifá Ogbèdí Divination Poetry
Published 2023-05-01Subjects: “…Yorùbá, Single Parenting, Marriage by Proxy, Divorce, Nigeria…”
Get full text
Article -
9
Provably secure and efficient proxy signature scheme
Published 2014-08-01Subjects: Get full text
Article -
10
Delegation authorization mechanism with controllable permissions propagation for IoT devices sharing
Published 2019-04-01Subjects: Get full text
Article -
11
Research and implementation of fuzzing testing based on HTTP proxy
Published 2016-02-01Subjects: Get full text
Article -
12
Provably secure certificate less blind proxy re-signatures
Published 2012-09-01Subjects: Get full text
Article -
13
Foraminiferal test dissolution reveals severe sediment acidification in estuarine mudflats: new perspectives for present and historical assessment
Published 2024-07-01Subjects: “…Sediment acidification proxy…”
Get full text
Article -
14
Addressing the conundrum of unavailable name-bearing types
Published 2012-12-01Subjects: Get full text
Article -
15
Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing
Published 2022-06-01Subjects: Get full text
Article -
16
Design and implementation of routing strategy based on terminal trust
Published 2016-04-01Subjects: Get full text
Article -
17
Integrity checking protocol with identity-based proxy signature in mobile cloud computing
Published 2015-10-01Subjects: Get full text
Article -
18
Verifiable federated aggregation method based on homomorphic proxy re-authentication
Published 2024-06-01Subjects: Get full text
Article -
19
Design and performance analysis of a SDN-based intelligent and collaborative Honeynet for mobile networks environment
Published 2018-11-01Subjects: Get full text
Article -
20
Partially blind proxy re-signature scheme with proven security
Published 2018-02-01Subjects: “…partially blind proxy re-signature…”
Get full text
Article