Academic literature on the topic 'Proxy Re-Encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Proxy Re-Encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Proxy Re-Encryption"
Shao, Jun, Peng Liu, Guiyi Wei, and Yun Ling. "Anonymous proxy re-encryption." Security and Communication Networks 5, no. 5 (2011): 439–49. http://dx.doi.org/10.1002/sec.326.
Full textLi, Juyan, Zhiqi Qiao, Kejia Zhang, and Chen Cui. "A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing." Sensors 21, no. 1 (2021): 288. http://dx.doi.org/10.3390/s21010288.
Full textFang, LiMing, JianDong Wang, ChunPeng Ge, and YongJun Ren. "Fuzzy conditional proxy re-encryption." Science China Information Sciences 56, no. 5 (2012): 1–13. http://dx.doi.org/10.1007/s11432-012-4623-6.
Full textFang, Liming, Willy Susilo, Chunpeng Ge, and Jiandong Wang. "Hierarchical conditional proxy re-encryption." Computer Standards & Interfaces 34, no. 4 (2012): 380–89. http://dx.doi.org/10.1016/j.csi.2012.01.002.
Full textGuo, Hui, Zhenfeng Zhang, Jing Xu, and Ningyu An. "Non-transferable Proxy Re-encryption." Computer Journal 62, no. 4 (2018): 490–506. http://dx.doi.org/10.1093/comjnl/bxy096.
Full textWang, Chih-Hung, and Pei-Jyun Lu. "Certificateless Broadcast Proxy Re-encryption With Group-Oriented Model." International Journal of Computer and Communication Engineering 5, no. 5 (2016): 358–66. http://dx.doi.org/10.17706/ijcce.2016.5.5.358-366.
Full textSon, Junggab, Heekuck Oh, and SangJin Kim. "A Single Re-encryption key based Conditional Proxy Re-Encryption Scheme." Journal of the Korea Institute of Information Security and Cryptology 23, no. 2 (2013): 147–55. http://dx.doi.org/10.13089/jkiisc.2013.23.2.147.
Full textLuo, Fucai, and Saif Al-Kuwari. "Revocable attribute-based proxy re-encryption." Journal of Mathematical Cryptology 15, no. 1 (2021): 465–82. http://dx.doi.org/10.1515/jmc-2020-0039.
Full textJiang, Zheng Tao, Yi Peng Zhang, Chen Li, Pian Niu, and Xiao Li Huang. "Survey and Analysis on Proxy Re-Encryption Schemes." Advanced Materials Research 912-914 (April 2014): 1538–43. http://dx.doi.org/10.4028/www.scientific.net/amr.912-914.1538.
Full textMeng, Xian Yong, Zhong Chen, Xiang Yu Meng, and Bing Sun. "An Identity-Based Conditional Proxy Re-Encryption in Cloud Computing Environments." Applied Mechanics and Materials 571-572 (June 2014): 74–78. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.74.
Full textDissertations / Theses on the topic "Proxy Re-Encryption"
Sbai, Anass. "Contributions au proxy de re-chiffrement et à la délégation d'authentification." Electronic Thesis or Diss., Amiens, 2021. http://www.theses.fr/2021AMIE0032.
Full textDou, Yanzhi. "Toward Privacy-Preserving and Secure Dynamic Spectrum Access." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/81882.
Full textXiong, Huijun. "Secure Data Service Outsourcing with Untrusted Cloud." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/23191.
Full textNguyen, Kim Thuat. "Lightweight security protocols for IP-based Wireless Sensor Networks and the Internet of Things." Thesis, Evry, Institut national des télécommunications, 2016. http://www.theses.fr/2016TELE0025/document.
Full textNguyen, Kim Thuat. "Lightweight security protocols for IP-based Wireless Sensor Networks and the Internet of Things." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2016. http://www.theses.fr/2016TELE0025.
Full textSuriadi, Suriadi. "Strengthening and formally verifying privacy in identity management systems." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/39345/1/Suriadi_Suriadi_Thesis.pdf.
Full textArfaoui, Ghada. "Conception de protocoles cryptographiques préservant la vie privée pour les services mobiles sans contact." Thesis, Orléans, 2015. http://www.theses.fr/2015ORLE2013/document.
Full textBellafqira, Reda. "Chiffrement homomorphe et recherche par le contenu sécurisé de données externalisées et mutualisées : Application à l'imagerie médicale et l'aide au diagnostic." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2017. http://www.theses.fr/2017IMTA0063.
Full textChen, Chun-Hung, and 陳俊宏. "Attribute-Based Proxy Re-Encryption." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/54484495945273108005.
Full textChiu, Yun-Peng, and 邱允鵬. "Efficient Secure Multicast Schemes Using Proxy Re-Encryption." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/26207264674691747325.
Full textBooks on the topic "Proxy Re-Encryption"
Conditional Identity Broadcast based Proxy Re-Encryption Technique for Data Encryption in Cloud. ASDF International, 2017.
Find full textBook chapters on the topic "Proxy Re-Encryption"
Weng, Jian, and Junzuo Lai. "Proxy Re-encryption." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1453-1.
Full textCanard, Sébastien, and Julien Devigne. "Combined Proxy Re-encryption." In Information Security and Cryptology -- ICISC 2013. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12160-4_4.
Full textDöttling, Nico, and Ryo Nishimaki. "Universal Proxy Re-Encryption." In Public-Key Cryptography – PKC 2021. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-75245-3_19.
Full textGuo, Hui, Zhenfeng Zhang, and Jiang Zhang. "Proxy Re-encryption with Unforgeable Re-encryption Keys." In Cryptology and Network Security. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12280-9_2.
Full textFuchsbauer, Georg, Chethan Kamath, Karen Klein, and Krzysztof Pietrzak. "Adaptively Secure Proxy Re-encryption." In Public-Key Cryptography – PKC 2019. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17259-6_11.
Full textChu, Cheng-Kang, Jian Weng, Sherman S. M. Chow, Jianying Zhou, and Robert H. Deng. "Conditional Proxy Broadcast Re-Encryption." In Information Security and Privacy. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02620-1_23.
Full textGreen, Matthew, and Giuseppe Ateniese. "Identity-Based Proxy Re-encryption." In Applied Cryptography and Network Security. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-72738-5_19.
Full textKirshanova, Elena. "Proxy Re-encryption from Lattices." In Public-Key Cryptography – PKC 2014. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54631-0_5.
Full textAteniese, Giuseppe, Karyn Benson, and Susan Hohenberger. "Key-Private Proxy Re-encryption." In Topics in Cryptology – CT-RSA 2009. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00862-7_19.
Full textChow, Sherman S. M., Jian Weng, Yanjiang Yang, and Robert H. Deng. "Efficient Unidirectional Proxy Re-Encryption." In Progress in Cryptology – AFRICACRYPT 2010. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12678-9_19.
Full textConference papers on the topic "Proxy Re-Encryption"
Zhong, WeiDong, Xu An Wang, Ziqing Wang, and Yi Ding. "Proxy Re-encryption with Keyword Search from Anonymous Conditional Proxy Re-encryption." In 2011 Seventh International Conference on Computational Intelligence and Security (CIS). IEEE, 2011. http://dx.doi.org/10.1109/cis.2011.217.
Full textBellafqira, Reda, Gouenou Coatrieux, Dalel Bouslimi, Gwénolé Quellec, and Michel Cozic. "Proxy Re-Encryption Based on Homomorphic Encryption." In ACSAC 2017: 2017 Annual Computer Security Applications Conference. ACM, 2017. http://dx.doi.org/10.1145/3134600.3134616.
Full textXu, Peng, Jun Xu, Wei Wang, Hai Jin, Willy Susilo, and Deqing Zou. "Generally Hybrid Proxy Re-Encryption." In ASIA CCS '16: ACM Asia Conference on Computer and Communications Security. ACM, 2016. http://dx.doi.org/10.1145/2897845.2897923.
Full textWang, Xu An, Ziqing Wang, Yi Ding, and Shujun Bai. "K-times Proxy Re-encryption." In 2011 Seventh International Conference on Computational Intelligence and Security (CIS). IEEE, 2011. http://dx.doi.org/10.1109/cis.2011.213.
Full textWang, Xu an, and Xiaoyuan Yang. "On DDos Attack against Proxy in Proxy Re-encryption and Proxy Re-signature." In 2009 Ninth IEEE International Conference on Computer and Information Technology. IEEE, 2009. http://dx.doi.org/10.1109/cit.2009.31.
Full textHe, Yi-Jun, Tat Wing Chim, Lucas Chi Kwong Hui, and Siu-Ming Yiu. "Non-Transferable Proxy Re-Encryption Scheme." In 2012 5th International Conference on New Technologies, Mobility and Security (NTMS). IEEE, 2012. http://dx.doi.org/10.1109/ntms.2012.6208714.
Full textMo, Lequn, and Guoxiang Yao. "Multi-Use Conditional Proxy Re-encryption." In 2013 International Conference on Information Science and Cloud Computing Companion (ISCC-C). IEEE, 2013. http://dx.doi.org/10.1109/iscc-c.2013.90.
Full textThangam, V., and K. Chandrasekaran. "Elliptic Curve Based Proxy Re-Encryption." In the Second International Conference. ACM Press, 2016. http://dx.doi.org/10.1145/2905055.2905337.
Full textSrinivasan, Akshayaram, and C. Pandu Rangan. "Certificateless Proxy Re-Encryption Without Pairing." In ASIA CCS '15: 10th ACM Symposium on Information, Computer and Communications Security. ACM, 2015. http://dx.doi.org/10.1145/2732516.2732519.
Full textShao, Jun, Guiyi Wei, Yun Ling, and Mande Xie. "Identity-Based Conditional Proxy Re-Encryption." In ICC 2011 - 2011 IEEE International Conference on Communications. IEEE, 2011. http://dx.doi.org/10.1109/icc.2011.5962419.
Full text