共 50 条
- [41] An Improved Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2015, 2015, 557 : 14 - 26
- [42] A type-and-identity-based proxy re-encryption scheme and its application in healthcare SECURE DATA MANAGEMENT, PROCEEDINGS, 2008, 5159 : 185 - 198
- [43] Sharing your privileges securely: a key-insulated attribute based proxy re-encryption scheme for IoT World Wide Web, 2018, 21 : 595 - 607
- [44] Sharing your privileges securely: a key-insulated attribute based proxy re-encryption scheme for IoT WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2018, 21 (03): : 595 - 607
- [45] Performance Analysis of the Symmetric Proxy Re-encryption Scheme 2019 4TH INTERNATIONAL WORKSHOP ON BIG DATA AND INFORMATION SECURITY (IWBIS 2019), 2019, : 91 - 96
- [46] Hierarchical Identity Role based proxy re-encryption scheme for cloud computing PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2013,
- [47] Circular Transitivity of a Bidirectional Proxy Re-encryption Scheme MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 2639 - +
- [49] Efficient proxy re-encryption with keyword search scheme Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2014, 51 (06): : 1221 - 1228
- [50] Proxy Re-Encryption Scheme for Decentralized Storage Networks APPLIED SCIENCES-BASEL, 2022, 12 (09):