Font Size: a A A
Keyword [Proxy Re-encryption]
Result: 61 - 80 | Page: 4 of 7
61. Access Control And Ciphertexts Search On Attribute-Based Encryption In Cloud Storage
62. Research On Key Techniques For Secure Cloud Data Sharing And Processing
63. Lattice-based Fully Homomorphic Encryption And Its Applications
64. Research On Lattice-based Proxy Re-encryption Scheme
65. Research And Design Of Public Key Cryptosystem Based On Lattice Theory
66. Research On Proxy Broadcast Re-Encryption And Its Security
67. Studies On Provably Secure Public-Key Cryptosystems
68. Research On Efficient And Provable Secure Attribute-Based Encryption Schemes And Its Applications
69. Research On Lattice-based Proxy Re-encryption Schemes
70. Research On Program Obfuscation Under Cloud Service Outsourcing
71. Research On Certificate-based Conditional Proxy Re-encryption
72. Research And Analysis On Proxy Re-encryption Cryptography
73. Resarch On Cloud Storage Access Control From Authorization Center
74. Identity Based Proxy Re-encryption With Keyword Search
75. Research On Attribute-Based Keyword Search With Proxy Re-encryption Scheme
76. Study Of Reprocessing On Encrypted Data
77. Study On Proxy Re-Encryption And Its Application In Telemedicine
78. Research And Implementation Of File Integrity In A Multi-User Environment
79. Research On Access Control Technologies For Named Data Networking
80. The Research And Implementation Of Hidden Ciphertext-policy Attribute-based Proxy Re-encryption Scheme
  <<First  <Prev  Next>  Last>>  Jump to