CORC

浏览/检索结果: 共30条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
A practical construction for large universe hierarchical attribute-based encryption 期刊论文
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017
Li, Cong; Fang, Yuejian; Zhang, Xing; Jin, Cancan; Shen, Qingni; Wu, Zhonghai
收藏  |  浏览/下载:3/0  |  提交时间:2017/12/03
Towards Multi-Hop Homomorphic Identity-Based Proxy Re-Encryption via Branching Program 期刊论文
IEEE ACCESS, 2017
Li, Zengpeng; Ma, Chunguang; Wang, Ding
收藏  |  浏览/下载:5/0  |  提交时间:2017/12/03
Ciphertext-policy attribute-based encryption with user and authority accountability 其他
2015-01-01
Zhang, Xing; Jin, Cancan; Li, Cong; Wen, Zilong; Shen, Qingni; Fang, Yuejian; Wu, Zhonghai
收藏  |  浏览/下载:6/0  |  提交时间:2017/12/03
A note on certificate-based encryption 其他
2014-01-01
Qi, Yanfeng; Tang, Chunming; Xu, Maozhi; Guo, Baoan
收藏  |  浏览/下载:2/0  |  提交时间:2015/11/13
基于属性的可搜索加密方案 其他
2014-01-01
李双; 徐茂智
收藏  |  浏览/下载:2/0  |  提交时间:2015/11/12
Identity-Based Encryption on RSA Without Pairings and Key Escrow 其他
2014-01-01
Zhu Yan; Wang Shanbiao; Ma Di; Feng Rongquan
收藏  |  浏览/下载:4/0  |  提交时间:2015/11/16
An identity-based conditional proxy re-encryption in cloud computing environments 其他
2014-01-01
Meng, Xian Yong; Chen, Zhong; Meng, Xiang Yu; Sun, Bing
收藏  |  浏览/下载:6/0  |  提交时间:2015/11/13
A novel proxy re-encryption with keyword search 其他
2014-01-01
Meng, Xian Yong; Chen, Zhong; Meng, Xiang Yu
收藏  |  浏览/下载:6/0  |  提交时间:2015/11/13
Hierarchical identity-based encryption without key delegation in decryption 期刊论文
international journal of grid and utility computing, 2014
Luo, Song; Chen, Zhong
收藏  |  浏览/下载:5/0  |  提交时间:2015/11/13
Efficient identity-based encryption without pairings and key escrow for mobile devices 其他
2013-01-01
Zhu, Yan; Ma, Di; Wang, Shanbiao; Feng, Rongquan
收藏  |  浏览/下载:4/0  |  提交时间:2015/11/17


©版权所有 ©2017 CSpace - Powered by CSpace