Page 1 from 186 hits

Sort by: Relevancy | Date newest | Title A-Z

  1.  

    Obfuscation for multi‐use re‐encryption and its application in cloud computing

    Cheng, Rong / Zhang, Fangguo | Wiley | 2015
    Keywords: multi‐use reencryption, conditional reencryption, broadcast reencryption
  2.  

    A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system

    Liu, Yepeng / Ren, Yongjun / Ge, Chunpeng et al. | Elsevier | 2019
    Keywords: Conditional proxy re-encryption, Broadcast proxy re-encryption
  3.  

    Hierarchical conditional proxy re-encryption

    Fang, Liming / Susilo, Willy / Ge, Chunpeng et al. | Elsevier | 2012
    Keywords: Proxy re-encryption, Hierarchical conditional proxy re-encryption
  4.  

    A new outsourcing conditional proxy re‐encryption suitable for mobile cloud environment

    Son, Junggab / Kim, Donghyun / Bhuiyan, Md Zakirul Alam et al. | Wiley | 2017
    Keywords: proxy reencryption, conditional proxy reencryption
  5.  

    DR-PRE: dual receiver proxy re-encryption scheme

    Patil, Shravani Mahesh / B R, Purushothama | Taylor & Francis Verlag | 2020
    Keywords: Dual receiver proxy re-encryption, proxy re-encryption
  6.  

    Provably secure lattice based identity based unidirectional PRE and PRE + schemes

    Singh, Kunwar / Rangan, C. Pandu / Agrawal, Richa et al. | Elsevier | 2020
    Keywords: Unidirectional proxy re-encryption, Lattice based non-interactive proxy re-encryption
  7.  

    Circular Transitivity of a Bidirectional Proxy Re-Encryption Scheme

    National licence
    Hong, Xiao Jing / Wang, Bin | Trans Tech Publications | 2013
    Keywords: Proxy Re-Encryption
  8.  

    A ciphertext‐policy attribute‐based proxy re‐encryption scheme for data sharing in public clouds

    Liang, Kaitai / Fang, Liming / Wong, Duncan S. et al. | Wiley | 2015
    Keywords: proxy reencryption, ciphertext‐policy attribute‐based proxy reencryption
  9.  

    Commutative Re-encryption Techniques: Significance and Analysis

    Islam, Nazmul / Rokibul Alam, Kazi Md. / Rahman, Shaikh Shiam | Taylor & Francis Verlag | 2015
    Keywords: re-encryption
  10.  

    A real-time parking service with proxy re-encryption in vehicular cloud computing

    Lin, Iuon-Chang / Cheng, Chen-Yang / Chen, Hsiang-Yu | Elsevier | 2019
    Keywords: Re-encryption
  11.  

    Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts

    Liang, Kaitai / Chu, Cheng-Kang / Tan, Xiao et al. | Elsevier | 2014
    Keywords: Conditional proxy re-encryption, Identity-based proxy re-encryption
  12.  

    Mobile access and flexible search over encrypted cloud data in heterogeneous systems

    Sun, Jianfei / Xiong, Hu / Zhang, Hao et al. | Elsevier | 2019
    Keywords: Proxy re-encryption
  13.  

    GROSE: Optimal group size estimation for broadcast proxy re-encryption

    Maiti, Sumana / Misra, Sudip | Elsevier | 2020
    Keywords: Proxy re-encryption
  14.  

    Privacy preserving protocol for service aggregation in cloud computing

    Wang, Peishun / Mu, Yi / Susilo, Willy et al. | Wiley | 2012
    Keywords: reencryption
  15.  

    A UNIQUE ASSISTANCE THAT PROVIDES GUARANTEE THE HIDING OF DATA

    Prathima, Chillakuru / Venkatadri, N | BASE | 2016
    Keywords: Privacy; Anonymity; Proxy Re-Encryption; Big Data;
  16.  

    Efficient identity-based multi-bit proxy re-encryption over lattice in the standard model

    Hou, Jinqiu / Jiang, Mingming / Guo, Yuyan et al. | Elsevier | 2019
    Keywords: Proxy re-encryption
  17.  

    A NOVEL APPROACH FOR MULTI SHARING AUTHENTICATED FILTERED DATA FOR BIG DATA STORAGE

    Supriya, Tammireddy / Mutyalaiah, Paricherla / Bhaskar Rao, Challa | BASE | 2017
    Keywords: Privacy; Anonymity; Proxy Re-Encryption; Big Data;
  18.  

    Fuzzy conditional proxy re-encryption

    Fang, LiMing / Wang, JianDong / Ge, ChunPeng et al. | Springer Verlag | 2012
    Keywords: proxy re-encryption, fuzzy conditional proxy re-encryption
  19.  

    EFADS: Efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption

    Wei, Guiyi / Lu, Rongxing / Shao, Jun | Elsevier | 2014
    Keywords: Proxy re-encryption

Number of results: 10 | 20 | 50

Feedback