Year of publication
Type of media
Source
Subject
Type of material
Language
1–20 of 185 hits
Sort by:
Sort by:
-
Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption
Springer Verlag | 2015|Keywords: Proxy Re-encryption, Re-encryption verifiability -
A Partially Decentralised Protocol for a Distributed Encrypted Storage System
Springer Verlag | 2023|Keywords: Re-encryption -
EduChain: A Blockchain-Based Privacy-Preserving Lifelong Education Platform
Springer Verlag | 2023|Keywords: Proxy re-encryption -
Secure Pervasive Healthcare System and Diabetes Prediction Using Heuristic Algorithm
Wiley | 2019|Keywords: proxy re‐encryption -
A Blockchain and Proxy Re-encryption Based Approach for IoT Data Security: A Review
Springer Verlag | 2023|Keywords: Proxy re-encryption -
Hierarchical Medical Services Data Sharing Scheme Based on Searchable Attribute Encryption
Springer Verlag | 2023|Keywords: Attribute re-encryption -
Attacks to the Proxy Re-Encryption Schemes from IWSEC2011
Springer Verlag | 2013|Keywords: Proxy re-encryption, unforgeability of re-encryption keys -
Management of IoT Devices Data Security Using Blockchain and Proxy Re-encryption Algorithm
Springer Verlag | 2023|Keywords: Proxy re-encryption -
Cryptanalysis of Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing
Springer Verlag | 2020|Keywords: Proxy re-encryption -
Privacy-Preserving Educational Credentials Sharing Based on Blockchain and Proxy Re-Encryption
Springer Verlag | 2023|Keywords: Proxy Re-Encryption -
A Provably Secure Re-encryption-Based Access Control in Hierarchy
Springer Verlag | 2018|Keywords: Proxy re-encryption -
Lattice Puncturable Attribute Based Proxy Re-encryption Scheme and Its Application in Information Centric Network
Springer Verlag | 2022|Keywords: Proxy re-encryption -
Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption
Springer Verlag | 2011|Keywords: Proxy re-encryption, unforgeability of re-encryption keys -
Data Owner Centric Approach to Ensure Data Protection in Cloud Environment
Springer Verlag | 2015|Keywords: Re-encryption -
Conditional Proxy Broadcast Re-Encryption
Springer Verlag | 2009|Keywords: proxy re-encryption, conditional proxy re-encryption -
Secure Multicast Using Proxy Re-encryption in IoT Environment
Springer Verlag | 2017|Keywords: Proxy re-encryption -
Multi-key Homomorphic Proxy Re-Encryption
Springer Verlag | 2018|Keywords: Proxy re-encryption, Homomorphic Proxy Re-Encryption -
Proxy Re-Encryption Using Vector Decomposition
Springer Verlag | 2021|Keywords: Proxy re-encryption -
A Scheme to Manage Encrypted Data Storage with Deduplication in Cloud
Springer Verlag | 2015|Keywords: Proxy Re-encryption -
Securing Healthcare Information over Cloud Using Hybrid Approach
Springer Verlag | 2018|Keywords: Proxy re-encryption
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.