CORC

浏览/检索结果: 共6条,第1-6条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Identity-Based Broadcast Encryption with Efficient Revocation 期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2019, 卷号: 11442 LNCS, 页码: 405-435
作者:  Ge, Aijun;  Wei, Puwen
收藏  |  浏览/下载:10/0  |  提交时间:2019/12/11
Multi-authority attribute-based encryption scheme with constant-size ciphertexts and user revocation 期刊论文
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 卷号: 31
作者:  Zhang, Xiao;  Wu, Faguo;  Yao, Wang;  Wang, Zhao;  Wang, Wenhua
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/30
An expressive decentralizing KP-ABE scheme with constant-size ciphertext 期刊论文
International Journal of Network Security, 2013, 卷号: 15, 期号: 3, 页码: 131-140
Li, Qinyi (1); Xiong, Hu (1); Zhang, Fengli (1); Zeng, Shengke (1)
收藏  |  浏览/下载:17/0  |  提交时间:2014/12/16
Dual system encryption revisited: Attaining fully secure identity-based encryption and its extensions 期刊论文
guofang keji daxue xuebaojournal of national university of defense technology, 2012
Luo, Song; Chen, Yu; Chen, Zhong
收藏  |  浏览/下载:3/0  |  提交时间:2015/11/13
CCA2 secure biometric identity based encryption with constant-size ciphertext 期刊论文
JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2011, 卷号: 12, 页码: 819-827
作者:  Yang, Yang;  Hu, Yu-pu;  Zhang, Le-you;  Sun, Chun-hui
收藏  |  浏览/下载:5/0  |  提交时间:2019/11/21
Generalized hierarchical identity-based signcryption 期刊论文
Journal of Computers, 2010, 卷号: 5, 期号: 7, 页码: 1078-1085
作者:  Wang, Hao;  Xu, Qiuliang;  Zhao, Xiufeng
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/26


©版权所有 ©2017 CSpace - Powered by CSpace