CORC

浏览/检索结果: 共30条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Toward Proxy Re-Encryption From Learning with Errors in the Exponent 会议论文
16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems, AUG 01-04, 2017
作者:  Li, Zengpeng;  Ma, Chunguang;  Wang, Ding;  Zhao, Minghao;  Zhao, Qian
收藏  |  浏览/下载:8/0  |  提交时间:2019/12/31
A Time-Based Group Key Management Algorithm Based on Proxy Re-encryption for Cloud Storage 会议论文
作者:  Cui, Yihui;  Peng, Zhiyong;  Song, Wei;  Li, Xiaojuan;  Cheng, Fangquan
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/05
Accelerating GPGPU architecture simulation 会议论文
2013 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS 2013, Pittsburgh, PA
作者:  Yu zhibin;  Eeckhout Lieven;  Goswami Nilanjian;  Li tao;  John lizy K.
收藏  |  浏览/下载:15/0  |  提交时间:2015/08/28
Towards a Secure Certificateless Proxy Re-Encryption Scheme 会议论文
7th International Conference on Provable Security (ProvSec), Melaka, MALAYSIA, OCT 23-25, 2013
Guo, Hui; Zhang, Zhenfeng; Zhang, Jiang; Chen, Cheng
收藏  |  浏览/下载:13/0  |  提交时间:2014/12/16
on the security of a bidirectional proxy re-encryption scheme from pkc 2010 会议论文
14th International Conference on Practice and Theory in Public Key Cryptography, PKC 2011, Taormina, Italy, 6-Mar-02
Weng Jian; Zhao Yunlei; Hanaoka Goichiro
收藏  |  浏览/下载:9/0  |  提交时间:2011/10/10
Proxy signature scheme secure against chosen key and chosen warrant attacks 会议论文
2nd International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC 2010, Wuhan, Hubei, China, April 24, 2010 - April 25, 2010
作者:  Hu, Guozheng;  Han, Lansheng
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/04
efficient unidirectional proxy re-encryption 会议论文
3rd International Conference on Cryptology in Africa, AFRICACRYPT 2010, Stellenbosch, South africa, May 3, 201
Chow Sherman S. M.; Weng Jian; Yang Yanjiang; Deng Robert H.
收藏  |  浏览/下载:16/0  |  提交时间:2011/03/31
attribute-based conditional proxy re-encryption with chosen-ciphertext security 会议论文
53rd IEEE Global Communications Conference, GLOBECOM 2010, Miami, FL, United states, 40883
Zhao Jing; Feng Dengguo; Zhang Zhenfeng
收藏  |  浏览/下载:15/0  |  提交时间:2011/03/31
Research of the multi-uplink high-performance web caching proxy 会议论文
5th International Conference on Pervasive Computing and Applications, ICPCA10, Maribor, Slovenia, December 1, 2010 - December 3, 2010
作者:  Li, Lin;  Chen, Wenbo;  Tang, Jun;  Li, Shanxi
收藏  |  浏览/下载:3/0  |  提交时间:2017/01/18
Group key management using proxy re-encryption for dynamic networks 会议论文
作者:  Zhang, Minqing;  Wu, Xuguang;  Han, Yiliang;  Yang, Xiaoyuan
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/18


©版权所有 ©2017 CSpace - Powered by CSpace