Results 271 to 280 of about 38,037 (283)
Some of the next articles are maybe not open access.

HIBPEKS: Hierarchical Identity-based Puncturable Encryption With Keyword Search Over Outsourced Encrypted Data

IEEE Transactions on Information Forensics and Security
Zelin Zhang   +5 more
semanticscholar   +1 more source

Analysis of hierarchical identity based encryption schemes and its applicability to computing environments

Journal of Information Security and Applications, 2017
Renu Mary Daniel   +2 more
semanticscholar   +1 more source

An Efficient Hierarchical Identity-Based Encryption Scheme for the Key Escrow

International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Yuanlong Li, Fang Qi, Zhe Tang
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy