共 50 条
- [41] Leakage resilient ID-based proxy re-encryption scheme for access control in fog computing FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 87 : 679 - 685
- [43] Improved Proxy Re-encryption Scheme for Symmetric Key Cryptography 2017 INTERNATIONAL WORKSHOP ON BIG DATA AND INFORMATION SECURITY (IWBIS 2017), 2017, : 105 - 111
- [45] An Efficient Certificateless Proxy Re-Encryption Scheme Without Pairing PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 413 - 433
- [46] A new RSA-based proxy re-encryption scheme Journal of Computational Information Systems, 2015, 11 (02): : 567 - 575
- [47] A proxy re-encryption scheme based on elliptic curve group Yin, Shou-Lin (352720214@qq.com), 1600, Ubiquitous International (08):
- [48] A Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 56 (02): : 339 - 352
- [49] A BGN-Type Homomorphic Proxy Re-Encryption Scheme INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 226 - 229
- [50] Non-transitive Bidirectional Proxy Re-encryption Scheme 2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 1, PROCEEDINGS, 2009, : 213 - 216