Font Size:
a
A
A
Keyword [Proxy Re-encryption]
Result: 61 - 80 | Page: 4 of 7
61.
Access Control And Ciphertexts Search On Attribute-Based Encryption In Cloud Storage
62.
Research On Key Techniques For Secure Cloud Data Sharing And Processing
63.
Lattice-based Fully Homomorphic Encryption And Its Applications
64.
Research On Lattice-based Proxy Re-encryption Scheme
65.
Research And Design Of Public Key Cryptosystem Based On Lattice Theory
66.
Research On Proxy Broadcast Re-Encryption And Its Security
67.
Studies On Provably Secure Public-Key Cryptosystems
68.
Research On Efficient And Provable Secure Attribute-Based Encryption Schemes And Its Applications
69.
Research On Lattice-based Proxy Re-encryption Schemes
70.
Research On Program Obfuscation Under Cloud Service Outsourcing
71.
Research On Certificate-based Conditional Proxy Re-encryption
72.
Research And Analysis On Proxy Re-encryption Cryptography
73.
Resarch On Cloud Storage Access Control From Authorization Center
74.
Identity Based Proxy Re-encryption With Keyword Search
75.
Research On Attribute-Based Keyword Search With Proxy Re-encryption Scheme
76.
Study Of Reprocessing On Encrypted Data
77.
Study On Proxy Re-Encryption And Its Application In Telemedicine
78.
Research And Implementation Of File Integrity In A Multi-User Environment
79.
Research On Access Control Technologies For Named Data Networking
80.
The Research And Implementation Of Hidden Ciphertext-policy Attribute-based Proxy Re-encryption Scheme
<<First
<Prev
Next>
Last>>
Jump to