共 50 条
- [42] An Efficient Multi-User Searchable Encryption Scheme without Query Transformation over Outsourced Encrypted Data 2018 9TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2018,
- [43] Verifying outsourced inner product computation via vector aggregation in cloud computing Zhang, Q. (zhangqin@njupt.edu.cn), 1600, Binary Information Press (10): : 2525 - 2532
- [44] Fully outsourced and fully verifiable attribute-based encryption for cloud data sharing CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (08): : 10437 - 10453
- [45] Development and implementation of authenticated multi-user mobile Java']Java applications WTS: 2009 WIRELESS TELECOMMUNICATIONS SYMPOSIUM, 2009, : 254 - 259
- [48] On Distributed Multi-User Secret Sharing with Multiple Secrets per User 2024 NATIONAL CONFERENCE ON COMMUNICATIONS, NCC, 2024,
- [49] Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption COMPUTER SECURITY - ESORICS 2022, PT II, 2022, 13555 : 105 - 125
- [50] The Capacity Region of Distributed Multi-User Secret Sharing Mirmohseni, Mahtab (mirmohseni@sharif.edu), 1600, Institute of Electrical and Electronics Engineers Inc. (02): : 1057 - 1071