Search

Your search keyword '"Re-encryption"' showing total 9 results

Search Constraints

Start Over You searched for: Descriptor "Re-encryption" Remove constraint Descriptor: "Re-encryption" Publisher springer nature Remove constraint Publisher: springer nature
9 results on '"Re-encryption"'

Search Results

1. Blockchain-based proxy re-encryption access control method for biological risk privacy protection of agricultural products.

2. Highly private blockchain-based management system for digital COVID-19 certificates.

3. Secure auditing and deduplication for encrypted cloud data supporting ownership modification.

4. Data sharing using proxy re-encryption based on DNA computing.

5. Secure multimedia distribution in cloud computing using re-encryption and fingerprinting.

6. An efficient traceable access control scheme with reliable key delegation in mobile cloud computing.

7. Secure Content Distribution Using Multi-hop Proxy Re-encryption.

8. Group-Based Proxy Re-encryption Scheme.

9. Securely Obfuscating Re-Encryption.

Catalog

Books, media, physical & digital resources