Search

Your search keyword '"Re-encryption"' showing total 85 results

Search Constraints

Start Over You searched for: Descriptor "Re-encryption" Remove constraint Descriptor: "Re-encryption"
85 results on '"Re-encryption"'

Search Results

51. A Fine-Grained User-Divided Privacy-Preserving Access Control Protocol in Smart Watch

52. An Efficient Mixnet-Based Voting Scheme Providing Receipt-Freeness

54. Encryption and Re-Randomization Techniques for Malware Propagation

55. A cloud-based framework for verifiable privacy-preserving spectrum auction

56. Efficiently Obfuscating Anonymous Re-encryption Functionality with Average-Case Virtual Black-Box Security.

57. Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage.

58. Two-party interactive secure deduplication with efficient data ownership management in cloud storage.

59. WGRe:a re-encryption anonymous tunnel

60. Hybrid-structured onion scheme against replay attack of MIX

61. An efficient traceable access control scheme with reliable key delegation in mobile cloud computing.

62. Bilinear-map accumulator-based verifiable intersection operations on encrypted data in cloud.

63. A secure re-encryption scheme for data services in a cloud computing environment.

64. Commutative Re-encryption Techniques: Significance and Analysis.

65. Lattice-based obfuscation for re-encryption functions.

66. Secure Content Distribution Using Multi-hop Proxy Re-encryption.

67. Mixnets: Implementation and performance evaluation of decryption and re-encryption types.

68. Re-encryption Optimization in CP-ABE Based Cryptographic Cloud Storage.

69. Towards temporal access control in cloud computing.

70. Enabling Re-encryption of Hierarchical Verifiable Permutation Scheme for Bittorrent Chunk Exchanges.

71. Securely Obfuscating Re-Encryption.

72. Secure deduplication for big data with efficient dynamic ownership updates.

73. Obfuscating Re-encryption Algorithm With Flexible and Controllable Multi-Hop on Untrusted Outsourcing Server

74. Sensors data collection framework using mobile identification with secure data sharing model

76. Attribute Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud

77. A Searchable Re-encryption Storage Method in Cloud Environment

78. What If Keys Are Leaked? towards Practical and Secure Re-Encryption in Deduplication-Based Cloud Storage.

79. A Fine-Grained User-Divided Privacy-Preserving Access Control Protocol in Smart Watch.

80. Hybrid Encryption Scheme Using Terminal Fingerprint and Its Application to Attribute-Based Encryption Without Key Misuse

81. An Efficient Ciphertext-Policy Attribute-Based Access Control towards Revocation in Cloud Computing

82. New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation

83. Mixnets: Implementation and Performance Evaluation of Decryption and Re-encryption Types

84. Cryptanalysis of a universally verifiable efficient re-encryption mixnet

85. Using re-encryption to escrow private information escrow bound to multiple conditions

Catalog

Books, media, physical & digital resources