共 50 条
- [2] Factoring-Based Proxy Re-Encryption Schemes PROVABLE SECURITY, 7TH INTERNATIONAL CONFERENCE, PROVSEC 2013, 2013, 8209 : 309 - 329
- [3] QR Code Security using Proxy Re-Encryption PROCEEDINGS OF IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2016), 2016,
- [4] IoT device security based on proxy re-encryption Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 1267 - 1273
- [6] Combined Proxy Re-encryption INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013, 2014, 8565 : 49 - 66
- [8] Proxy Re-encryption Schemes with Proxy Having Its Own Public/Private Keys 2010 2ND INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS PROCEEDINGS (DBTA), 2010,
- [9] Realizing Proxy Re-encryption in the Symmetric World INFORMATICS ENGINEERING AND INFORMATION SCIENCE, PT I, 2011, 251 : 259 - 274
- [10] Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption ADVANCES IN INFORMATION AND COMPUTER SECURITY, 2011, 7038 : 210 - +