Search

Your search keyword '"Re-encryption"' showing total 12 results

Search Constraints

Start Over You searched for: Descriptor "Re-encryption" Remove constraint Descriptor: "Re-encryption" Topic data encryption Remove constraint Topic: data encryption
12 results on '"Re-encryption"'

Search Results

1. Blockchain-based proxy re-encryption access control method for biological risk privacy protection of agricultural products.

2. Fine-Grained Access Control Scheme Based on Improved Proxy Re-Encryption in Cloud.

3. On the Privacy-Preserving Outsourcing Scheme of Reversible Data Hiding over Encrypted Image Data in Cloud Computing.

4. Identity-based re-encryption scheme with lightweight re-encryption key generation.

5. Efficiently Obfuscating Anonymous Re-encryption Functionality with Average-Case Virtual Black-Box Security.

6. Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage.

7. Two-party interactive secure deduplication with efficient data ownership management in cloud storage.

8. Bilinear-map accumulator-based verifiable intersection operations on encrypted data in cloud.

9. A secure re-encryption scheme for data services in a cloud computing environment.

10. Lattice-based obfuscation for re-encryption functions.

11. Mixnets: Implementation and Performance Evaluation of Decryption and Re-encryption Types.

12. Securely Obfuscating Re-Encryption.

Catalog

Books, media, physical & digital resources