Font Size: a A A
Keyword [chosen-ciphertext]
Result: 21 - 31 | Page: 2 of 2
21. Identity-Based Dual Receiver Encryption
22. Research And Implementation Of Proxy Re-encryption
23. Research On Key Techniques For Secure Cloud Data Sharing And Processing
24. Research On Asymmetric Encryption Algorithms Against Key-Leakage/Tampering Attacks
25. Research On Certificate-based Conditional Proxy Re-encryption
26. Research On Multi-authority Attribute-based Encryption For Cloud Computing
27. The Construction And Application Of Cryptosystem Based On Satisfiable Problem
28. A CCA Secure Identity-based Threshold Encryption
29. Chosen ciphertext security in identity based encryption
30. Research On Differential Analysis Of Two Image Encryption Algorithm Based On Chaotic
31. Study Of Policy Hidden Attribute-Based Encryption
  <<First  <Prev  Next>  Last>>  Jump to