Journal articles on the topic 'Proxy public key cryptography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Proxy public key cryptography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Chen, Jiahui, Jie Ling, Jianting Ning, et al. "Post quantum proxy signature scheme based on the multivariate public key cryptographic signature." International Journal of Distributed Sensor Networks 16, no. 4 (2020): 155014772091477. http://dx.doi.org/10.1177/1550147720914775.
Full textK. Sudharani, Ms, and Dr N. K. Sakthivel. "Design and development of a secure certificateless proxy signature based (SE-CLPS) encryption scheme for cloud storage." International Journal of Engineering & Technology 10, no. 1 (2021): 57. http://dx.doi.org/10.14419/ijet.v10i1.21480.
Full textChadrakala and C. Lingareddy S. "Secure and Efficient Bi-Directional Proxy Re-Encyrption Technique." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 3 (2018): 1143–50. https://doi.org/10.11591/ijeecs.v12.i3.pp1143-1150.
Full textKim, Won-Bin, Su-Hyun Kim, Daehee Seo, and Im-Yeong Lee. "Broadcast Proxy Reencryption Based on Certificateless Public Key Cryptography for Secure Data Sharing." Wireless Communications and Mobile Computing 2021 (December 16, 2021): 1–16. http://dx.doi.org/10.1155/2021/1567019.
Full textWang, Su Li, and Jun Yao Ye. "Applied-Information Technology in Certificateless Proxy Signature Scheme without Bilinear Pairings." Applied Mechanics and Materials 685 (October 2014): 532–35. http://dx.doi.org/10.4028/www.scientific.net/amm.685.532.
Full textB M, Chandrakala, and S. C. Linga Reddy. "Secure and Efficient Bi-Directional Proxy Re-Encyrption Technique." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 3 (2018): 1143. http://dx.doi.org/10.11591/ijeecs.v12.i3.pp1143-1150.
Full textMohd, Saiful Adli Mohamad, Din Roshidi, and Ilyani Ahmad Jasmin. "Research trends review on RSA scheme of asymmetric cryptography techniques." Bulletin of Electrical Engineering and Informatics 10, no. 1 (2021): 487–92. https://doi.org/10.11591/eei.v10i1.2493.
Full textWang, Yi. "Structure and Analysis of Certificateless Proxy Blind Signature Scheme without Bilinear Pairing." Advanced Materials Research 734-737 (August 2013): 3194–98. http://dx.doi.org/10.4028/www.scientific.net/amr.734-737.3194.
Full textREN, YANLI, DAWU GU, SHUOZHONG WANG, and XINPENGU ZHANG. "HIERARCHICAL IDENTITY-BASED PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES." International Journal of Foundations of Computer Science 21, no. 06 (2010): 1049–63. http://dx.doi.org/10.1142/s0129054110007726.
Full textMishra, Bharati, Debasish Jena, Ramasubbareddy Somula, and S. Sankar. "Secure Key Storage and Access Delegation Through Cloud Storage." International Journal of Knowledge and Systems Science 11, no. 4 (2020): 45–64. http://dx.doi.org/10.4018/ijkss.2020100104.
Full textS., Sree Vivek, Sharmila Deva Selvi S., Radhakishan V., and Pandu Rangan C. "EFFICIENT CONDITIONAL PROXY RE-ENCRYPTION WITH CHOSEN CIPHER TEXT SECURITY." International Journal of Network Security & Its Applications (IJNSA) 4, no. 2 (2012): 179 to 199. https://doi.org/10.5281/zenodo.3353830.
Full textZhou, Yousheng, Yurong Li, and Yuanni Liu. "A Certificateless and Dynamic Conditional Proxy Re-encryption-based Data Sharing Scheme for IoT Cloud." Journal of Internet Technology 26, no. 2 (2025): 165–72. https://doi.org/10.70003/160792642025032602002.
Full textB.Swarajya, Lakshmi. "Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity checking in Public Cloud." Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity checking in Public Cloud 5, no. 22 (2018): 744–57. https://doi.org/10.5281/zenodo.7856210.
Full textPang, Liaojun, Jie Yang, and Zhengtao Jiang. "A Survey of Research Progress and Development Tendency of Attribute-Based Encryption." Scientific World Journal 2014 (2014): 1–13. http://dx.doi.org/10.1155/2014/193426.
Full textLi, Juyan, Chunguang Ma, and Zhen Gu. "Multi-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input Setting." International Journal of Foundations of Computer Science 31, no. 05 (2020): 551–67. http://dx.doi.org/10.1142/s0129054120500252.
Full textYang, Hai Bin, Juan Li Sun, Xu An Wang, and Jian Cui. "Proxy Re-Signature Scheme from CBS to IBS." Advanced Materials Research 304 (July 2011): 355–58. http://dx.doi.org/10.4028/www.scientific.net/amr.304.355.
Full textB.Swarajya, Lakshmi1 A.D.Sivarama Kumar2. "Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity checking in Public Cloud." Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity checking in Public Cloud 05, no. 22 (2018): 744–55. https://doi.org/10.5281/zenodo.7810823.
Full textWu, Faguo, Bo Zhou, and Xiao Zhang. "Identity-Based Proxy Signature with Message Recovery over NTRU Lattice." Entropy 25, no. 3 (2023): 454. http://dx.doi.org/10.3390/e25030454.
Full textBukkawar, Mrunali, and Mohd Shafi Pathan. "Web-Proxy-Based Authentication and Authorization Mechanism Against Client-Based HTTP Attacks." International Journal of Synthetic Emotions 8, no. 1 (2017): 60–72. http://dx.doi.org/10.4018/ijse.2017010105.
Full textUshamani, G. D* Dr Y.C Kiran. "SECURE AND EFFICIENT DATA INTEGRITY PROOF AND RECOVERING DATA FOR IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING IN CLOUD COMPUTING (IB-PODUC)." Global Journal of Engineering Science and Research Management 4, no. 5 (2017): 51–57. https://doi.org/10.5281/zenodo.573506.
Full textZhou, Yunhong, Na Li, Yanmei Tian, Dezhi An, and Licheng Wang. "Public Key Encryption with Keyword Search in Cloud: A Survey." Entropy 22, no. 4 (2020): 421. http://dx.doi.org/10.3390/e22040421.
Full textDong, Siyue, Zhen Zhao, Baocang Wang, Wen Gao, and Shanshan Zhang. "Certificateless Encryption Supporting Multi-Ciphertext Equality Test with Proxy-Assisted Authorization." Electronics 12, no. 20 (2023): 4326. http://dx.doi.org/10.3390/electronics12204326.
Full textBhatti, David Samuel, Salbia Sidrat, Shahzad Saleem, et al. "Performance analysis: Securing SIP on multi-threaded/multi-core proxy server using public keys on Diffie–Hellman (DH) in single and multi-server queuing scenarios." PLOS ONE 19, no. 1 (2024): e0293626. http://dx.doi.org/10.1371/journal.pone.0293626.
Full textKhan, Farhad Ullah, Fahad Algarni, Insaf Ullah, et al. "A Hyperelliptic Curve Cryptosystem Based Proxy Promised Signcryption Scheme." Security and Communication Networks 2022 (April 27, 2022): 1–10. http://dx.doi.org/10.1155/2022/1232336.
Full textZhang, Minqing, Xu An Wang, Xiaoyuan Yang, and Weihua Li. "New Construction of PVPKE Scheme and Its Application in Information Systems and Mobile Communication." Mobile Information Systems 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/430797.
Full textMinaei, Mohsen, Pedro Moreno-Sanchez, and Aniket Kate. "MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies." Proceedings on Privacy Enhancing Technologies 2020, no. 3 (2020): 404–24. http://dx.doi.org/10.2478/popets-2020-0058.
Full textZengin, Benjamin, Paulin Deupmann, Nicolas Buchmann, and Marian Margraf. "Chosen-Ciphertext Secure Unidirectional Proxy Re-Encryption Based on Asymmetric Pairings." Applied Sciences 14, no. 23 (2024): 11322. https://doi.org/10.3390/app142311322.
Full textWang, Xu, Xiaoyuan Yang, Cong Li, Yudong Liu, and Yong Ding. "Improved functional proxy re-encryption schemes for secure cloud data sharing." Computer Science and Information Systems 15, no. 3 (2018): 585–614. http://dx.doi.org/10.2298/csis171218024w.
Full textSukte, Chudaman Devidasrao, Emmanuel Mark, and Ratnadeep R. Deshmukh. "Efficient Cryptographic Protocol Design for Secure Sharing of Personal Health Records in the Cloud." International Journal of Information Technologies and Systems Approach 15, no. 1 (2022): 1–16. http://dx.doi.org/10.4018/ijitsa.304810.
Full textWei, Zhang. "A Pairing-based Homomorphic Encryption Scheme for Multi-User Settings." International Journal of Technology and Human Interaction 12, no. 2 (2016): 72–82. http://dx.doi.org/10.4018/ijthi.2016040106.
Full textXiao, Yao, Lei Xu, Zikang Chen, Can Zhang, and Liehuang Zhu. "A Blockchain-Based Data Sharing System with Enhanced Auditability." Mathematics 10, no. 23 (2022): 4494. http://dx.doi.org/10.3390/math10234494.
Full textHylock, Ray Hales, and Xiaoming Zeng. "A Blockchain Framework for Patient-Centered Health Records and Exchange (HealthChain): Evaluation and Proof-of-Concept Study." Journal of Medical Internet Research 21, no. 8 (2019): e13592. http://dx.doi.org/10.2196/13592.
Full textMohapatra, Pradosh Kumar. "Public key cryptography." XRDS: Crossroads, The ACM Magazine for Students 7, no. 1 (2000): 14–22. http://dx.doi.org/10.1145/351092.351098.
Full textLiestyowati, Dwi. "Public Key Cryptography." Journal of Physics: Conference Series 1477 (March 2020): 052062. http://dx.doi.org/10.1088/1742-6596/1477/5/052062.
Full textGarfinkel, S. L. "Public key cryptography." Computer 29, no. 6 (1996): 101–4. http://dx.doi.org/10.1109/2.507642.
Full textOdlyzko, Andrew M. "Public Key Cryptography." AT&T Technical Journal 73, no. 5 (1994): 17–23. http://dx.doi.org/10.1002/j.1538-7305.1994.tb00606.x.
Full textLiu, Ke Ning, Jun Yao Ye, and Ying Lian Wang. "A New Certificateless Forward Secure Proxy Signcryption Scheme." Applied Mechanics and Materials 685 (October 2014): 659–62. http://dx.doi.org/10.4028/www.scientific.net/amm.685.659.
Full textAbdulla, Mohamed. "Vulnerabilities in Public Key Cryptography." International Journal of Psychosocial Rehabilitation 24, no. 5 (2020): 3881–86. http://dx.doi.org/10.37200/ijpr/v24i5/pr202096.
Full textFischer, Addison. "Public Key Cryptography in Action." Information Systems Security 3, no. 1 (1994): 57–70. http://dx.doi.org/10.1080/10658989409342446.
Full textCrenshaw, Scott. "Speedy public key cryptography system." Network Security 2000, no. 3 (2000): 6. http://dx.doi.org/10.1016/s1353-4858(00)03013-0.
Full textKak, S. C. "Secret-hardware public-key cryptography." IEE Proceedings E Computers and Digital Techniques 133, no. 2 (1986): 94. http://dx.doi.org/10.1049/ip-e.1986.0010.
Full textLuo, Jiaoyan, Liming Zuo, and Hao Liu. "Quantum-Resistant Lattice-Based Proxy Signature." Symmetry 17, no. 2 (2025): 261. https://doi.org/10.3390/sym17020261.
Full textNAGY, NAYA, MARIUS NAGY, and SELIM G. AKL. "KEY DISTRIBUTION VERSUS KEY ENHANCEMENT IN QUANTUM CRYPTOGRAPHY." Parallel Processing Letters 20, no. 03 (2010): 239–50. http://dx.doi.org/10.1142/s0129626410000193.
Full textLin, Chu-Hsing. "Hierarchical key assignment without public-key cryptography." Computers & Security 20, no. 7 (2001): 612–19. http://dx.doi.org/10.1016/s0167-4048(01)00711-8.
Full textShaheena, Khatoon, and Singh Thakur Balwant. "CERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHY." International Journal of Network Security & Its Applications (IJNSA) 7, no. 2 (2015): 55–59. https://doi.org/10.5281/zenodo.7988379.
Full textTsvetov, V. P. "FRACTAL MAGMAS AND PUBLIC-KEY CRYPTOGRAPHY." Vestnik of Samara University. Natural Science Series 26, no. 2 (2021): 23–49. http://dx.doi.org/10.18287/2541-7525-2020-26-2-23-49.
Full textLefton, Phyllis. "Number Theory and Public-Key Cryptography." Mathematics Teacher 84, no. 1 (1991): 54–63. http://dx.doi.org/10.5951/mt.84.1.0054.
Full textZHANG, Fu-Tai, Yin-Xia SUN, Lei ZHANG, Man-Man GENG, and Su-Juan LI. "Research on Certificateless Public Key Cryptography." Journal of Software 22, no. 6 (2011): 1316–32. http://dx.doi.org/10.3724/sp.j.1001.2011.04007.
Full textROSAMOND, Frances. "Computational Thinking Enrichment: Public-Key Cryptography." Informatics in Education 17, no. 1 (2018): 93–103. http://dx.doi.org/10.15388/infedu.2018.06.
Full textKrishna, Addepalli V. N., and Addepalli Hari Narayana. "Cubic spline curve public key cryptography." Journal of Discrete Mathematical Sciences and Cryptography 20, no. 2 (2017): 453–61. http://dx.doi.org/10.1080/09720529.2015.1112512.
Full text