Search

Your search keyword '"Re-encryption"' showing total 9 results

Search Constraints

Start Over You searched for: Descriptor "Re-encryption" Remove constraint Descriptor: "Re-encryption" Topic access control Remove constraint Topic: access control
9 results on '"Re-encryption"'

Search Results

1. Blockchain-based proxy re-encryption access control method for biological risk privacy protection of agricultural products.

2. Multiauthority CP-ABE-based Access Control Model for IoT-enabled Healthcare Infrastructure.

3. Secure auditing and deduplication for encrypted cloud data supporting ownership modification.

4. FTP-NDN: File Transfer Protocol Based on Re-Encryption for Named Data Network Supporting Nondesignated Receivers.

5. Re-encryption Optimization in CP-ABE Based Cryptographic Cloud Storage.

6. Towards temporal access control in cloud computing.

7. A Fine-Grained User-Divided Privacy-Preserving Access Control Protocol in Smart Watch

8. A Fine-Grained User-Divided Privacy-Preserving Access Control Protocol in Smart Watch.

9. New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation

Catalog

Books, media, physical & digital resources