Results 251 to 260 of about 20,722 (263)
Some of the next articles are maybe not open access.
Hierarchical Identity-Based Inner Product Functional Encryption forĀ Unbounded Hierarchical Depth
2023Anushree Belel +2 more
openaire +1 more source
Identity-based encryption with outsourced equality test in cloud computing
Information Sciences, 2016Sha Ma
exaly
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2016
Keita Emura +2 more
exaly
Keita Emura +2 more
exaly
Revocable hierarchical identity-based encryption via history-free approach
Theoretical Computer Science, 2016Jae Hong Seo, Keita Emura
exaly
CCA2 secure (hierarchical) identity-based parallel key-insulated encryption without random oracles
Journal of Systems and Software, 2010Yanli Ren, Dawu Gu
exaly
Anonymous hierarchical identity-based encryption with bounded leakage resilience and its application
International Journal of High Performance Computing and Networking, 2017exaly

