共 50 条
- [21] A 3-Level Re-Encryption Model to Ensure Data Protection in Cloud Computing Environments 2014 IEEE CONFERENCE ON SYSTEMS, PROCESS AND CONTROL (ICSPC 2014), 2014, : 36 - 40
- [22] Certificateless Proxy Re-encryption with Cryptographic Reverse Firewalls for Secure Cloud Data Sharing FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2025, 162
- [23] Keyword Searchable Re-encryption Scheme Considering Cloud Storage-Service Environment INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (05): : 2135 - 2146
- [26] A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach Journal of Grid Computing, 2015, 13 : 651 - 675
- [27] A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computing NETWORK AND SYSTEM SECURITY, 2014, 8792 : 82 - 95
- [28] POSTER: A Certificateless Proxy Re-Encryption Scheme for Cloud-based Data Sharing PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 869 - 871
- [29] A CP-ABE Scheme with Cloud Proxy Re-Encryption Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2023, 51 (03): : 728 - 735
- [30] Assured Update Scheme of Authorization for Cloud Data Access Based on Proxy Re-encryption Su, Mang (sumang@njust.edu.cn), 1600, Chinese Academy of Sciences (31): : 1563 - 1572