Dissertations / Theses on the topic 'Proxy Re-Encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 17 dissertations / theses for your research on the topic 'Proxy Re-Encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Sbai, Anass. "Contributions au proxy de re-chiffrement et à la délégation d'authentification." Electronic Thesis or Diss., Amiens, 2021. http://www.theses.fr/2021AMIE0032.
Full textDou, Yanzhi. "Toward Privacy-Preserving and Secure Dynamic Spectrum Access." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/81882.
Full textXiong, Huijun. "Secure Data Service Outsourcing with Untrusted Cloud." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/23191.
Full textNguyen, Kim Thuat. "Lightweight security protocols for IP-based Wireless Sensor Networks and the Internet of Things." Thesis, Evry, Institut national des télécommunications, 2016. http://www.theses.fr/2016TELE0025/document.
Full textNguyen, Kim Thuat. "Lightweight security protocols for IP-based Wireless Sensor Networks and the Internet of Things." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2016. http://www.theses.fr/2016TELE0025.
Full textSuriadi, Suriadi. "Strengthening and formally verifying privacy in identity management systems." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/39345/1/Suriadi_Suriadi_Thesis.pdf.
Full textArfaoui, Ghada. "Conception de protocoles cryptographiques préservant la vie privée pour les services mobiles sans contact." Thesis, Orléans, 2015. http://www.theses.fr/2015ORLE2013/document.
Full textBellafqira, Reda. "Chiffrement homomorphe et recherche par le contenu sécurisé de données externalisées et mutualisées : Application à l'imagerie médicale et l'aide au diagnostic." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2017. http://www.theses.fr/2017IMTA0063.
Full textChen, Chun-Hung, and 陳俊宏. "Attribute-Based Proxy Re-Encryption." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/54484495945273108005.
Full textChiu, Yun-Peng, and 邱允鵬. "Efficient Secure Multicast Schemes Using Proxy Re-Encryption." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/26207264674691747325.
Full textChen, Hsueh-Cheng, and 陳學呈. "Secret Data Access Based on Proxy Re-encryption." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/bdsa7t.
Full textZheng, Yan-Hong, and 鄭彥宏. "The Research of Attribute Based Encryption Schemes with Proxy Re-Encryption Capability." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/59174700583920445832.
Full textChen, Jun-Cheng, and 陳俊成. "Timed-Release Proxy Conditional Re-Encryption for Cloud Computing." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/31403077370758834835.
Full textHung, Yao-Min, and 洪曜民. "An Improved Multi-hop Proxy Re-encryption Scheme with CCA Security." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/bjg2ax.
Full textHuang, Yen-lin, and 黃彥霖. "Key-Aggregate Proxy Re-Encryption with Dynamic ConditionGeneration Using Multilinear Maps." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/38d2mt.
Full textLin, Yu-Ting, and 林雨葶. "Applying Proxy Re-Encryption to Ciphertext Search in Cloud Data Protection Mechanism." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/39u6r7.
Full textWang, Peter Shaojui, and 王紹睿. "Design of a Privacy-Preserving Data Mining System Based on Differential Privacy Using Additive-Homomorphic Proxy Re-Encryption Protocol Against Insider Attacks." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/63639699902141668295.
Full text