Font Size: a A A
Keyword [Re- encryption]
Result: 1 - 20 | Page: 1 of 8
1. Design And Analysis Of Lattice-Based Proxy Cryptography
2. Research On Cloud Computing Key Management
3. Research On Encryption Techniques For Data Privacy Preserving On The Cloud Platform
4. Research On Cloud Data Integrity And Usability
5. Study On The Applications Of Linear Maps In Secure Protocols
6. Research On WonGoo-A Peer-to-Peer Anonymous Communication Protocol
7. Proxy Re-Cryptography Revisited
8. Study And Design On Identity-Based Cryptosystems
9. Research On Attribute Based Cryptosystem
10. Identity-based Key Insulated Technology With Proxy
11. Research On Key Thchniques Of Sensitive Data Security In Open Environment
12. Research On Public Key Encryption With Keyword Search
13. Study And Design On Public Key Cryptosystems With Additional Properties
14. Research On Rational Sharing Of Digital Content
15. Research On Key Techniques Of Improving The Usability Of Cryptographic Access Control In Cloud Storage
16. Proxy Re-encryption Based Secure De-duplication
17. The Design And Analysis Of RFID Security Prococol
18. Research And Design Of E-mail System Based On Proxy Re-Encryption
19. Research On Data Access Control Based On Attributes-Sets
20. User Privacy Data Protection Based On Optimized Proxy Re-encryption In Cloud
  <<First  <Prev  Next>  Last>>  Jump to