Font Size:
a
A
A
Keyword [chosen-ciphertext]
Result: 21 - 31 | Page: 2 of 2
21.
Identity-Based Dual Receiver Encryption
22.
Research And Implementation Of Proxy Re-encryption
23.
Research On Key Techniques For Secure Cloud Data Sharing And Processing
24.
Research On Asymmetric Encryption Algorithms Against Key-Leakage/Tampering Attacks
25.
Research On Certificate-based Conditional Proxy Re-encryption
26.
Research On Multi-authority Attribute-based Encryption For Cloud Computing
27.
The Construction And Application Of Cryptosystem Based On Satisfiable Problem
28.
A CCA Secure Identity-based Threshold Encryption
29.
Chosen ciphertext security in identity based encryption
30.
Research On Differential Analysis Of Two Image Encryption Algorithm Based On Chaotic
31.
Study Of Policy Hidden Attribute-Based Encryption
<<First
<Prev
Next>
Last>>
Jump to