Results 231 to 240 of about 1,131 (250)
Some of the next articles are maybe not open access.

Proxy Re-Encryption That Supports Homomorphic Operations for Re-Encrypted Ciphertexts

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2019
Yutaka KAWAI   +4 more
openaire   +1 more source

A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain

IEEE Systems Journal, 2022
Kwame Opuni-Boachie Obour Agyekum   +2 more
exaly  

P2B: Privacy Preserving Identity-Based Broadcast Proxy Re-Encryption

IEEE Transactions on Vehicular Technology, 2020
SUMANA MAITI, Sudip Misra
exaly  

Flexible attribute-based proxy re-encryption for efficient data sharing

Information Sciences, 2020
Hua Deng, Zheng Qin, Qianhong Wu
exaly  

Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain

Journal of Network and Computer Applications, 2021
Ahsan Manzoor   +2 more
exaly  

Improved proxy re-encryption schemes with applications to secure distributed storage

ACM Transactions on Information and System Security, 2006
Matthew D Green, Susan Hohenberger
exaly  

Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation

Journal of Network and Computer Applications, 2017
David Nuñez, Isaac Agudo, Javier Lopez
exaly  

Medicine by Proxy?

Ca-A Cancer Journal for Clinicians, 1981
exaly   +2 more sources

A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing

Future Generation Computer Systems, 2015
Kaitai Liang, Man Ho Au, Willy Susilo
exaly  

Multi-use and unidirectional identity-based proxy re-encryption schemes

Information Sciences, 2010
Zhenfu Cao, Licheng Wang
exaly  

Home - About - Disclaimer - Privacy