Search

Your search keyword '"Re-encryption"' showing total 77 results

Search Constraints

Start Over You searched for: Descriptor "Re-encryption" Remove constraint Descriptor: "Re-encryption" Language english Remove constraint Language: english
77 results on '"Re-encryption"'

Search Results

1. Blockchain-based proxy re-encryption access control method for biological risk privacy protection of agricultural products.

2. Blockchain-based proxy re-encryption access control method for biological risk privacy protection of agricultural products

4. Multiauthority CP-ABE-based Access Control Model for IoT-enabled Healthcare Infrastructure.

5. Highly private blockchain-based management system for digital COVID-19 certificates.

6. PDLHR: Privacy-Preserving Deep Learning Model With Homomorphic Re-Encryption in Robot System.

7. A Comprehensive Study on Design and Development of Optical Image Encryption Techniques.

8. Encryption and Re-Randomization Techniques for Malware Propagation

9. A flexible and privacy-preserving federated learning framework based on logistic regression.

10. Secure Cloud Data Deduplication with Efficient Re-Encryption.

11. A cloud-based framework for verifiable privacy-preserving spectrum auction

12. Efficient Proxy Re-encryption Scheme for E-Voting System.

13. Fine-Grained Access Control Scheme Based on Improved Proxy Re-Encryption in Cloud.

14. A Congestion Control Mechanism based on Identity Authentication for Named Data Networking.

15. Secure auditing and deduplication for encrypted cloud data supporting ownership modification.

16. Proxy re-encryption architect for storing and sharing of cloud contents.

17. Data sharing using proxy re-encryption based on DNA computing.

18. Secure multimedia distribution in cloud computing using re-encryption and fingerprinting.

19. Sensors data collection framework using mobile identification with secure data sharing model.

20. Obfuscating Re-encryption Algorithm With Flexible and Controllable Multi-Hop on Untrusted Outsourcing Server

21. What If Keys Are Leaked? towards Practical and Secure Re-Encryption in Deduplication-Based Cloud Storage

22. Secure server-aided data sharing clique with attestation.

23. On the Privacy-Preserving Outsourcing Scheme of Reversible Data Hiding over Encrypted Image Data in Cloud Computing.

24. FTP-NDN: File Transfer Protocol Based on Re-Encryption for Named Data Network Supporting Nondesignated Receivers.

25. Identity-based re-encryption scheme with lightweight re-encryption key generation.

26. Encryption and Re-Randomization Techniques for Malware Propagation

27. A Fine-Grained User-Divided Privacy-Preserving Access Control Protocol in Smart Watch

28. A cloud-based framework for verifiable privacy-preserving spectrum auction

29. Efficiently Obfuscating Anonymous Re-encryption Functionality with Average-Case Virtual Black-Box Security.

30. Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage.

31. Two-party interactive secure deduplication with efficient data ownership management in cloud storage.

32. An efficient traceable access control scheme with reliable key delegation in mobile cloud computing.

33. Bilinear-map accumulator-based verifiable intersection operations on encrypted data in cloud.

34. A secure re-encryption scheme for data services in a cloud computing environment.

35. Commutative Re-encryption Techniques: Significance and Analysis.

36. Lattice-based obfuscation for re-encryption functions.

37. Secure Content Distribution Using Multi-hop Proxy Re-encryption.

38. Enabling Re-encryption of Hierarchical Verifiable Permutation Scheme for Bittorrent Chunk Exchanges.

39. Re-encryption Optimization in CP-ABE Based Cryptographic Cloud Storage.

40. Towards temporal access control in cloud computing.

41. Mixnets: Implementation and performance evaluation of decryption and re-encryption types.

42. Group-Based Proxy Re-encryption Scheme.

43. Securely Obfuscating Re-Encryption.

44. Secure deduplication for big data with efficient dynamic ownership updates.

46. What If Keys Are Leaked? towards Practical and Secure Re-Encryption in Deduplication-Based Cloud Storage.

47. Attribute Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud

48. A Searchable Re-encryption Storage Method in Cloud Environment

49. A Fine-Grained User-Divided Privacy-Preserving Access Control Protocol in Smart Watch.

50. New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation

Catalog

Books, media, physical & digital resources