Results 251 to 260 of about 20,722 (263)
Some of the next articles are maybe not open access.

Analysis of hierarchical identity based encryption schemes and its applicability to computing environments

Journal of Information Security and Applications, 2017
Renu Mary Daniel   +2 more
exaly  

Semi-Generic Transformation of Revocable Hierarchical Identity-Based Encryption and Its DBDH Instantiation

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2016
Keita Emura   +2 more
exaly  

Revocable hierarchical identity-based encryption via history-free approach

Theoretical Computer Science, 2016
Jae Hong Seo, Keita Emura
exaly  

Hierarchical Identity-Based Encryption Based onĀ SM9

Yi Chuai   +4 more
openaire   +1 more source

Anonymous hierarchical identity-based encryption with bounded leakage resilience and its application

International Journal of High Performance Computing and Networking, 2017
exaly  

Home - About - Disclaimer - Privacy