Results 241 to 250 of about 1,131 (250)
Some of the next articles are maybe not open access.

Time-based proxy re-encryption scheme for secure data sharing in a cloud environment

Information Sciences, 2014
Qin Liu, Guojun Wang, Jie Wu
exaly  

Unidirectional proxy re-encryption

2012
Susan R. Hohenberger   +3 more
openaire   +1 more source

A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing

IEEE Transactions on Information Forensics and Security, 2014
Kaitai Liang, Man Ho Au, Joseph K Liu
exaly  

Medicine by Proxy?

Ca-A Cancer Journal for Clinicians, 1980
exaly  

Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage

Information Sciences, 2019
Xiaojun Zhang   +2 more
exaly  

Identity-based conditional proxy re-encryption with fine grain policy

Computer Standards and Interfaces, 2017
Chunpeng Ge, Willy Susilo, Liming Fang
exaly  

EFFICIENT IBE-PKE PROXY RE-ENCRYPTION

Proceedings of the International Conference on Security and Cryptography, 2008
openaire   +1 more source

Updatable Proxy Re-Encryption from Lattice

Bimei Wang   +5 more
openaire   +1 more source

Home - About - Disclaimer - Privacy