Font Size: a A A
Keyword [Re-Encryption]
Result: 41 - 60 | Page: 3 of 8
41. Research On Proxy Re-encryption Cryptography And Its Application
42. Study On Content Security Of Remote Sensing Image In Cloud Computing
43. Study On Identity/Attribute-based Encryption For Cloud Computing
44. Research On Several Issues Of Proxy Re-encryption
45. Research On Security Enhancement Approach For Virtual Border In Computing Environment
46. Research On Key Cryptographic Technologies Of Access Control Over Outsourced Data In Cloud Computing Environments
47. The Key Technologies Research For Data Service In Mobile Internet
48. Research On Access Control Mechanisms For Cloud Storage System From Attribute-based Encryption
49. Research On Access Control Based On Encryption In Cloud Storage
50. Research On The Method Of Cloud Storage Deduplication For Encrypted Files
51. Research On Identity-based Access Control Mechanism For Named Data Networking
52. Implementing Secure Data Access Control For Cloud Storage System Supporting File Attribute Modification
53. The Research And Implement Of Identity-based Proxy Re-encryption Email System
54. Conditional Identity-based Broadcast Proxy Re-Encryption And Its Application To Cloud Email
55. Research On Program Obfuscation Under Virtual Black-Box Security
56. Research Of Users' Data Privacy-preserving Technology In Cloud Computing
57. Generally Hybrid Proxy Re-Encryption And Its Application
58. Research On Subscription-Based Cryptographic Access Control In Cloud Computing
59. Research And Application On Group-based Proxy Re-Encryption In Cloud Storage Environment
60. Research On Multi-Authority Attribute-Based Encryption Scheme
  <<First  <Prev  Next>  Last>>  Jump to