-
1
-
2
Hybrid-structured onion scheme against replay attack of MIX
Published 2009-01-01Subjects: Get full text
Article -
3
Cryptanalysis of a hybrid-structured onion routing scheme
Published 2013-04-01Subjects: Get full text
Article -
4
Fingerprint template protection by adopting random projection based on re-encryption
Published 2018-02-01Subjects: Get full text
Article -
5
Threshold re-encryption based secure deduplication method for cloud data with resistance against side channel attack
Published 2020-06-01Subjects: Get full text
Article -
6
Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing
Published 2022-06-01Subjects: Get full text
Article -
7
Trusted secure model for data services in cloud computing
Published 2014-10-01Subjects: Get full text
Article -
8
Research on the programming language for proxy re-encryption
Published 2018-06-01Subjects: “…proxy re-encryption…”
Get full text
Article -
9
Constructing fair-exchange protocols for cloud computing
Published 2013-03-01Subjects: Get full text
Article -
10
Electronic medical record data sharing scheme based on searchable encryption via consortium blockchain
Published 2020-08-01Subjects: Get full text
Article -
11
Efficient chosen-ciphertext secure proxy re-encryption scheme
Published 2013-07-01Subjects: “…proxy re-encryption…”
Get full text
Article -
12
Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application
Published 2021-03-01Subjects: Get full text
Article -
13
Naval fleet across-domain communication scheme based on CP-ABE
Published 2015-11-01Subjects: Get full text
Article -
14
Encrypted image retrieval in multi-key settings based on edge computing
Published 2020-04-01Subjects: Get full text
Article -
15
Asymmetric proxy re-encryption system achievable for office user to securely sharing outsourcing data of mobile terminal
Published 2016-09-01Subjects: “…proxy re-encryption…”
Get full text
Article -
16
Achieving efficient dynamic cryptographic access control in cloud storage
Published 2011-01-01Subjects: Get full text
Article -
17
Attribute-based proxy re-encryption scheme with multiple features
Published 2019-06-01Subjects: Get full text
Article -
18
Resplittable threshold multi-broker proxy re-encryption scheme from lattices
Published 2017-05-01Subjects: “…proxy re-encryption…”
Get full text
Article -
19
Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage
Published 2024-09-01Subjects: Get full text
Article -
20
RLWE-based ciphertext-policy attribute proxy re-encryption
Published 2018-11-01Subjects: “…proxy re-encryption…”
Get full text
Article