共 50 条
- [41] Proxy Re-encryption Scheme from IBE to CBE [J]. FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 99 - 102
- [43] Circular Transitivity of a Bidirectional Proxy Re-encryption Scheme [J]. MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 2639 - +
- [44] Efficient proxy re-encryption with keyword search scheme [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2014, 51 (06): : 1221 - 1228
- [45] Proxy Re-Encryption Scheme for Decentralized Storage Networks [J]. APPLIED SCIENCES-BASEL, 2022, 12 (09):
- [46] A Secure Revocable Identity-Based Proxy Re-encryption Scheme for Cloud Storage [J]. CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 519 - 530
- [47] POSTER: A Certificateless Proxy Re-Encryption Scheme for Cloud-based Data Sharing [J]. PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 869 - 871
- [48] Proxy Re-Encryption Scheme Supporting a Selection of Delegatees [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014, 2014, 8469 : 13 - 30
- [49] Group-Based Proxy Re-encryption Scheme [J]. EMERGING INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, 5754 : 1025 - 1034
- [50] Towards a Secure Certificateless Proxy Re-Encryption Scheme [J]. PROVABLE SECURITY, 7TH INTERNATIONAL CONFERENCE, PROVSEC 2013, 2013, 8209 : 330 - 346