Results 271 to 280 of about 38,037 (283)
Some of the next articles are maybe not open access.
IEIE Transactions on Smart Processing & Computing
K. Lakshmi Narayanan, R. Naresh
semanticscholar +1 more source
K. Lakshmi Narayanan, R. Naresh
semanticscholar +1 more source
Revocable hierarchical identity-based encryption with shorter private keys and update keys
Designs, Codes and Cryptography, 2018Kwangsu Lee, Seunghwan Park
semanticscholar +1 more source
IEEE Transactions on Information Forensics and Security
Zelin Zhang +5 more
semanticscholar +1 more source
Zelin Zhang +5 more
semanticscholar +1 more source
Journal of Information Security and Applications, 2017
Renu Mary Daniel +2 more
semanticscholar +1 more source
Renu Mary Daniel +2 more
semanticscholar +1 more source
Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles
Yohei Watanabe, Junji Shikata
openalex +1 more source
An Efficient Hierarchical Identity-Based Encryption Scheme for the Key Escrow
International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017Yuanlong Li, Fang Qi, Zhe Tang
semanticscholar +1 more source
Revocable hierarchical identity-based encryption over lattice for pay-TV systems
Leyou Zhang +3 more
openalex +1 more source
Chosen-ciphertext Secure Hierarchical Identity-based Encryption from R-LWE
Xue-Feng Jiang, Ting Wang, Zhiwei Sun
openalex
SecHome: A Secure Large-Scale Smart Home System Using Hierarchical Identity Based Encryption
Yu Li, Yazhe Wang, Yuan Zhang
openalex +1 more source

