Font Size: a A A
Keyword [provable security]
Result: 141 - 160 | Page: 8 of 10
141. Research On Provable Security Of Juna Cryptoscheme
142. The Reaserch And Implementation Of The NTRU Variant-D-NTRU Algorithm
143. The Design And Implementation Of Deniable Authenticated Encryption
144. Study On Attribute-based Cryptographic Algorithms
145. Analysis And Constructions Of Public Key Encryption With Ekyword Search
146. Homomorphic Tags Based Cloud Storage Integrity Verification Techniques
147. Research And Application Of Provable Security Public-key Cryptosystem Based On LWE
148. Research And Application On Theory Of Obfuscation In Cryptographic Protocol
149. Research On Provably Secure Proxy Blind Signature
150. Reasearch On Cloud Data Auditing Protocols With Dynamic Operations
151. Design And Analysis Of Certificateless Aggregate Signature Schemes
152. Study On Key-aggregate Cryptosystem In Cloud Environment
153. Two Kinds Of Proxy Signature Schemes And Application
154. Study On Theory And Application Technology Of Digital Signature And Authentication
155. Study On Attribute-based Data Access Control Methods
156. Research And Implementation Of Encryption Algorithm Using Layered Cellular Automata
157. Construction And Security Proof Of Some Fundamental Public Key Cryptographic Schemes
158. Study On Theory And Application Of Certificateless Public Key Cryptosystem
159. Research On Keyword Privacy Of Ciphertext Retrieval In The Cloud Storage
160. Research On Multi-user Searchable Encryption And Secure Data Sharing In Cloud Storage System
  <<First  <Prev  Next>  Last>>  Jump to