-
1
Lightweight PUF-based anonymous authentication protocol in V2G
Published 2024-10-01Subjects: Get full text
Article -
2
Multi-authority attribute-based encryption with efficient user revocation in cloud computing
Published 2016-02-01Subjects: Get full text
Article -
3
Revocable identity-based proxy re-signature scheme in the standard model
Published 2019-05-01Subjects: Get full text
Article -
4
Time-based and privacy protection revocable and traceable data sharing scheme in cloud computing
Published 2021-10-01Subjects: Get full text
Article -
5
Multi-keyword search over encrypted data with user revocation
Published 2017-08-01Subjects: Get full text
Article