Search

Your search keyword '"Re-encryption"' showing total 107 results

Search Constraints

Start Over You searched for: Descriptor "Re-encryption" Remove constraint Descriptor: "Re-encryption"
107 results on '"Re-encryption"'

Search Results

1. Blockchain-based proxy re-encryption access control method for biological risk privacy protection of agricultural products.

2. Blockchain-based proxy re-encryption access control method for biological risk privacy protection of agricultural products

5. Multiauthority CP-ABE-based Access Control Model for IoT-enabled Healthcare Infrastructure.

6. Highly private blockchain-based management system for digital COVID-19 certificates.

7. PDLHR: Privacy-Preserving Deep Learning Model With Homomorphic Re-Encryption in Robot System.

8. A Comprehensive Study on Design and Development of Optical Image Encryption Techniques.

9. Encryption and Re-Randomization Techniques for Malware Propagation

10. A flexible and privacy-preserving federated learning framework based on logistic regression.

11. Secure Cloud Data Deduplication with Efficient Re-Encryption.

12. Secure File Transfer Protocol for Named Data Networks Supporting Homomorphic Computations

13. Cloud-Based Data-Sharing Scheme Using Verifiable and CCA-Secure Re-encryption from Indistinguishability Obfuscation

14. A cloud-based framework for verifiable privacy-preserving spectrum auction

15. Design and Implementation of a Dynamic Re-encryption System Based on the Priority Scheduling

16. Efficient Proxy Re-encryption Scheme for E-Voting System.

17. Towards Efficient and Secure Encrypted Databases: Extending Message-Locked Encryption in Three-Party Model

18. Fine-Grained Access Control Scheme Based on Improved Proxy Re-Encryption in Cloud.

19. 基于CP-ABE重加密的敏感数据访问控制限制方案.

20. A Congestion Control Mechanism based on Identity Authentication for Named Data Networking.

21. Secure auditing and deduplication for encrypted cloud data supporting ownership modification.

22. 基于阈值重加密的抗边信道攻击云数据安全去重方法.

23. Proxy re-encryption architect for storing and sharing of cloud contents.

24. Data sharing using proxy re-encryption based on DNA computing.

25. Secure multimedia distribution in cloud computing using re-encryption and fingerprinting.

26. Sensors data collection framework using mobile identification with secure data sharing model.

27. Apollo: End-to-End Verifiable Voting Protocol Using Mixnet and Hidden Tweaks

28. Towards Efficient Re-encryption for Secure Client-Side Deduplication in Public Clouds

29. OBC Based Optimization of Re-encryption for Cryptographic Cloud Storage

33. Program Obfuscator for Privacy-Carrying Unidirectional One-hop Re-encryption

34. Hybrid Encryption Scheme Using Terminal Fingerprint and Its Application to Attribute-Based Encryption Without Key Misuse

35. Anonymous-CPABE: Privacy Preserved Content Disclosure for Data Sharing in Cloud

36. Shared and Searchable Encrypted Data for Semi-trusted Servers with Controllable Sharing Property

37. Obfuscating Re-encryption Algorithm With Flexible and Controllable Multi-Hop on Untrusted Outsourcing Server

38. What If Keys Are Leaked? towards Practical and Secure Re-Encryption in Deduplication-Based Cloud Storage

39. Secure server-aided data sharing clique with attestation.

40. On the Privacy-Preserving Outsourcing Scheme of Reversible Data Hiding over Encrypted Image Data in Cloud Computing.

41. New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation

42. FTP-NDN: File Transfer Protocol Based on Re-Encryption for Named Data Network Supporting Nondesignated Receivers.

43. Identity-based re-encryption scheme with lightweight re-encryption key generation.

44. 基于重加密的随机映射指纹模板保护方案.

45. Group-Based Proxy Re-encryption Scheme

46. A Practical Voting Scheme with Receipts

47. Encryption and Re-Randomization Techniques for Malware Propagation

48. A Fine-Grained User-Divided Privacy-Preserving Access Control Protocol in Smart Watch

49. An Efficient Mixnet-Based Voting Scheme Providing Receipt-Freeness

Catalog

Books, media, physical & digital resources