Font Size: a A A
Keyword [proxy re-encryption]
Result: 1 - 20 | Page: 1 of 7
1. Design And Analysis Of Lattice-Based Proxy Cryptography
2. Research On Encryption Techniques For Data Privacy Preserving On The Cloud Platform
3. Research On Cloud Data Integrity And Usability
4. Proxy Re-Cryptography Revisited
5. Study And Design On Identity-Based Cryptosystems
6. Research On Attribute Based Cryptosystem
7. Identity-based Key Insulated Technology With Proxy
8. Research On Key Thchniques Of Sensitive Data Security In Open Environment
9. Research On Public Key Encryption With Keyword Search
10. Study And Design On Public Key Cryptosystems With Additional Properties
11. Research On Rational Sharing Of Digital Content
12. Proxy Re-encryption Based Secure De-duplication
13. Research And Design Of E-mail System Based On Proxy Re-Encryption
14. Research On Data Access Control Based On Attributes-Sets
15. User Privacy Data Protection Based On Optimized Proxy Re-encryption In Cloud
16. Research Of Access Control Mechanisms Based On Ciphertext Policy Attribute-based Encryption In Cloud Storage
17. Research On Bilinear Pairing Based Proxy Re-encryption
18. Studies On Proxy Re-encryption Schemes
19. Researches On Certificateless Proxy Re-encryption
20. Research On Proxy Re-encryption Based On Fuzzy Key Words Search
  <<First  <Prev  Next>  Last>>  Jump to