Year of publication
Type of media
Subject
Type of material
Language
101–120 of 506 hits
Sort by:
Sort by:
-
E-Health Cloud Security Using Timing Enabled Proxy Re-Encryption
Online Contents | 2018|Keywords: Proxy re-encryption -
Survey and Analysis on Proxy Re-Encryption Schemes
National licenceTrans Tech Publications | 2014|Keywords: Proxy Re-Encryption Model -
Non-transitive and collusion resistant quorum controlled proxy re-encryption scheme for resource constrained networks
Elsevier | 2019|Keywords: Proxy re-encryption -
Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search
Elsevier | 2012|Keywords: Conditional proxy re-encryption -
Server-aided private set intersection based on reputation
Elsevier | 2016|Keywords: Symmetric key proxy re-encryption -
On the Insecurity of an Identity Based Proxy Re-encryption Scheme
IOS Press | 2010Keywords: identity based proxy re-encryption -
An identity-based proxy re-encryption for data deduplication in cloud
Elsevier | 2021|Keywords: Identity-based proxy re-encryption -
Verifiable outsourcing EMRs scheme with attribute-based encryption in cloud-edge environments
Elsevier | 2023|Keywords: Proxy re-encryption -
An Efficient Construction of Quantum Attack Resistant Proxy Re-Encryption Based on (Semi)group Factorization Problems*
IOS Press | 2018|Keywords: Proxy re-encryption -
A Blockchain-Based Secure Sharing Scheme for Electrical Impedance Tomography Data
Free accessDOAJ | 2024|Keywords: proxy re-encryption -
Fine-grained and heterogeneous proxy re-encryption for secure cloud storage
Online Contents | 2014|Keywords: Proxy re-encryption -
Conditional Proxy Re-Encryption-Based Key Sharing Mechanism for Clustered Federated Learning
Free accessDOAJ | 2024|Keywords: proxy re-encryption -
An access control model for data security sharing cross‐domain in consortium blockchain
Free accessWiley | 2023|Keywords: Proxy Re‐Encryption -
IoT device security based on proxy re-encryption
Online Contents | 2018|Keywords: Proxy re-encryption -
A secure re‐encryption scheme for data services in a cloud computing environment
Wiley | 2015|Keywords: re‐encryption -
IB-VPRE: adaptively secure identity-based proxy re-encryption scheme from LWE with re-encryption verifiability
Springer Verlag | 2022|Keywords: Identity-based proxy re-encryption, Re-encryption verifiability -
$$l-$$PEES-IMP: lightweight proxy re-encryption-based identity management protocol for enhancing privacy over multi-cloud environment
Online Contents | 2021|Keywords: Proxy re-encryption -
MLAS: Multiple level authentication scheme for VANETs
Elsevier | 2012|Keywords: Proxy re-encryption -
A Novel Proxy Re-Encryption with Keyword Search
National licenceTrans Tech Publications | 2014|Keywords: Proxy Re-Encryption
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.