Year of publication
Type of media
Source
Type of material
Licence
Language
61–80 of 185 hits
Sort by:
Sort by:
-
Access Control Based on Proxy Re-encryption Technology for Personal Health Record Systems
Springer Verlag | 2020|Keywords: Proxy re-encryption -
Secure Multiparty Learning from Aggregation of Locally Trained Models
Springer Verlag | 2019|Keywords: Proxy re-encryption -
Verifiable Attribute-Based Proxy Re-encryption with Non-repudiation Based on Blockchain
Springer Verlag | 2024|Keywords: Proxy Re-Encryption -
Apollo: End-to-End Verifiable Voting Protocol Using Mixnet and Hidden Tweaks
Springer Verlag | 2016|Keywords: Re-encryption -
Proxy Re-Encryption Scheme for Access Control Enforcement Delegation on Outsourced Data in Public Cloud
Springer Verlag | 2018|Keywords: Proxy re-encryption -
A Novel Lattice-Based Ciphertext-Policy Attribute-Based Proxy Re-encryption for Cloud Sharing
Springer Verlag | 2019|Keywords: Proxy re-encryption -
Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012
Springer Verlag | 2013|Keywords: unidirectional proxy re-encryption -
Policy-Based De-duplication in Secure Cloud Storage
Springer Verlag | 2013|Keywords: Proxy Re-encryption -
A Secure Protocol for Authentication and Data Storage for Healthcare System
Springer Verlag | 2023|Keywords: Proxy re-encryption -
A Secure Revocable Identity-Based Proxy Re-encryption Scheme for Cloud Storage
Springer Verlag | 2018|Keywords: Proxy re-encryption -
Proxy Re-encryption with Delegatable Verifiability
Springer Verlag | 2016|Keywords: Proxy re-encryption -
Towards Attribute-Based Credentials in the Cloud
Springer Verlag | 2018|Keywords: Proxy re-encryption -
Electronic Health Record Data Sharing Cryptographic Algorithm Based on Blockchain
Springer Verlag | 2020|Keywords: Proxy re-encryption -
A Tag-Based Protection Method for Multi-tenant Data Security
Springer Verlag | 2018|Keywords: Proxy re-encryption -
Towards Efficient Re-encryption for Secure Client-Side Deduplication in Public Clouds
Springer Verlag | 2016|Keywords: Re-encryption -
Multi-user Order Preserving Encryption Scheme in Cloud Computing Environments
Springer Verlag | 2018|Keywords: Ciphertext Re-encryption -
Threshold Proxy Re-encryption and Its Application in Blockchain
Springer Verlag | 2018|Keywords: Proxy re-encryption -
Access Control Mechanism for Cloud Data Using Block Chain and Proxy Re-Encryption
Springer Verlag | 2020|Keywords: Proxy re-encryption -
Secure Data Sharing Using Two Fold Cryptography Key Protection, Proxy Re-encryption and Key Separation Techniques
Springer Verlag | 2020|Keywords: Proxy re-encryption
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.