Gotowa bibliografia na temat „Proxy public key cryptography”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Proxy public key cryptography”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Proxy public key cryptography"
Chen, Jiahui, Jie Ling, Jianting Ning, et al. "Post quantum proxy signature scheme based on the multivariate public key cryptographic signature." International Journal of Distributed Sensor Networks 16, no. 4 (2020): 155014772091477. http://dx.doi.org/10.1177/1550147720914775.
Pełny tekst źródłaK. Sudharani, Ms, and Dr N. K. Sakthivel. "Design and development of a secure certificateless proxy signature based (SE-CLPS) encryption scheme for cloud storage." International Journal of Engineering & Technology 10, no. 1 (2021): 57. http://dx.doi.org/10.14419/ijet.v10i1.21480.
Pełny tekst źródłaChadrakala and C. Lingareddy S. "Secure and Efficient Bi-Directional Proxy Re-Encyrption Technique." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 3 (2018): 1143–50. https://doi.org/10.11591/ijeecs.v12.i3.pp1143-1150.
Pełny tekst źródłaKim, Won-Bin, Su-Hyun Kim, Daehee Seo, and Im-Yeong Lee. "Broadcast Proxy Reencryption Based on Certificateless Public Key Cryptography for Secure Data Sharing." Wireless Communications and Mobile Computing 2021 (December 16, 2021): 1–16. http://dx.doi.org/10.1155/2021/1567019.
Pełny tekst źródłaWang, Su Li, and Jun Yao Ye. "Applied-Information Technology in Certificateless Proxy Signature Scheme without Bilinear Pairings." Applied Mechanics and Materials 685 (October 2014): 532–35. http://dx.doi.org/10.4028/www.scientific.net/amm.685.532.
Pełny tekst źródłaB M, Chandrakala, and S. C. Linga Reddy. "Secure and Efficient Bi-Directional Proxy Re-Encyrption Technique." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 3 (2018): 1143. http://dx.doi.org/10.11591/ijeecs.v12.i3.pp1143-1150.
Pełny tekst źródłaMohd, Saiful Adli Mohamad, Din Roshidi, and Ilyani Ahmad Jasmin. "Research trends review on RSA scheme of asymmetric cryptography techniques." Bulletin of Electrical Engineering and Informatics 10, no. 1 (2021): 487–92. https://doi.org/10.11591/eei.v10i1.2493.
Pełny tekst źródłaWang, Yi. "Structure and Analysis of Certificateless Proxy Blind Signature Scheme without Bilinear Pairing." Advanced Materials Research 734-737 (August 2013): 3194–98. http://dx.doi.org/10.4028/www.scientific.net/amr.734-737.3194.
Pełny tekst źródłaREN, YANLI, DAWU GU, SHUOZHONG WANG, and XINPENGU ZHANG. "HIERARCHICAL IDENTITY-BASED PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES." International Journal of Foundations of Computer Science 21, no. 06 (2010): 1049–63. http://dx.doi.org/10.1142/s0129054110007726.
Pełny tekst źródłaMishra, Bharati, Debasish Jena, Ramasubbareddy Somula, and S. Sankar. "Secure Key Storage and Access Delegation Through Cloud Storage." International Journal of Knowledge and Systems Science 11, no. 4 (2020): 45–64. http://dx.doi.org/10.4018/ijkss.2020100104.
Pełny tekst źródłaRozprawy doktorskie na temat "Proxy public key cryptography"
Möller, Bodo. "Public key cryptography theory and practice /." [S.l. : s.n.], 2003. http://elib.tu-darmstadt.de/diss/000372.
Pełny tekst źródłaHan, Yong-Fei. "Fast algorithms for public key cryptography." Thesis, Royal Holloway, University of London, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.244544.
Pełny tekst źródłaMelin, Tomas, and Tomas Vidhall. "Namecoin as authentication for public-key cryptography." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-108413.
Pełny tekst źródłaGaubatz, Gunnar. "Tamper-resistant arithmetic for public-key cryptography." Worcester, Mass. : Worcester Polytechnic Institute, 2007. http://www.wpi.edu/Pubs/ETD/Available/etd-030107-115645/.
Pełny tekst źródłaWright, Moriah E. "RSA, Public-Key Cryptography, and Authentication Protocols." Youngstown State University / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1339297480.
Pełny tekst źródłaHeindl, Raymond A. "New directions in multivariate public key cryptography." Connect to this title online, 2009. http://etd.lib.clemson.edu/documents/1247508584/.
Pełny tekst źródłaMcIvor, C. "Algorithms and silicon architectures for public-key cryptography." Thesis, Queen's University Belfast, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.419513.
Pełny tekst źródłaFerradi, Houda. "Integrity, authentication and confidentiality in public-key cryptography." Thesis, Paris Sciences et Lettres (ComUE), 2016. http://www.theses.fr/2016PSLEE045/document.
Pełny tekst źródłaHettinger, Christopher James. "A New Public-Key Cryptosystem." BYU ScholarsArchive, 2014. https://scholarsarchive.byu.edu/etd/5492.
Pełny tekst źródłaGjøsteen, Kristian. "Subgroup membership problems and public key cryptosystems." Doctoral thesis, Norwegian University of Science and Technology, Faculty of Information Technology, Mathematics and Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-128.
Pełny tekst źródłaKsiążki na temat "Proxy public key cryptography"
Garrett, Paul, and Daniel Lieman, eds. Public-Key Cryptography. American Mathematical Society, 2005. http://dx.doi.org/10.1090/psapm/062.
Pełny tekst źródłaSalomaa, Arto. Public-Key Cryptography. Springer Berlin Heidelberg, 1990. http://dx.doi.org/10.1007/978-3-662-02627-4.
Pełny tekst źródłaImai, Hideki, and Yuliang Zheng, eds. Public Key Cryptography. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0054009.
Pełny tekst źródłaBatten, Lynn Margaret. Public Key Cryptography. John Wiley & Sons, Inc., 2013. http://dx.doi.org/10.1002/9781118482261.
Pełny tekst źródłaNaccache, David, and Pascal Paillier, eds. Public Key Cryptography. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45664-3.
Pełny tekst źródłaImai, Hideki, and Yuliang Zheng, eds. Public Key Cryptography. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/b75033.
Pełny tekst źródłaKim, Kwangjo, ed. Public Key Cryptography. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-44586-2.
Pełny tekst źródłaSalomaa, Arto. Public-Key Cryptography. Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/978-3-662-03269-5.
Pełny tekst źródłaNechvatal, James. Public-key cryptography. U.S. Dept. of Commerce, National Institute of Standards and Technology, 1991.
Znajdź pełny tekst źródłaNechvatal, James. Public-key cryptography. Computer Systems Laboratory, National Institute of Standards and Technology, U.S. Dept. of Commerce, 1991.
Znajdź pełny tekst źródłaCzęści książek na temat "Proxy public key cryptography"
Bleumer, Gerrit. "Public Key Proxy Encryption." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_217.
Pełny tekst źródłaBleumer, Gerrit. "Public Key Proxy Signatures." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_218.
Pełny tekst źródłaJakobsson, Markus. "On Quorum Controlled Asymmetric Proxy Re-encryption." In Public Key Cryptography. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-49162-7_9.
Pełny tekst źródłaBleumer, Gerrit. "Public Key Proxy Encryption." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2023. http://dx.doi.org/10.1007/978-3-642-27739-9_217-2.
Pełny tekst źródłaBleumer, Gerrit. "Public Key Proxy Encryption." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_217.
Pełny tekst źródłaBleumer, Gerrit. "Public Key Proxy Signatures." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_218.
Pełny tekst źródłaDöttling, Nico, and Ryo Nishimaki. "Universal Proxy Re-Encryption." In Public-Key Cryptography – PKC 2021. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-75245-3_19.
Pełny tekst źródłaFuchsbauer, Georg, Chethan Kamath, Karen Klein, and Krzysztof Pietrzak. "Adaptively Secure Proxy Re-encryption." In Public-Key Cryptography – PKC 2019. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17259-6_11.
Pełny tekst źródłaKirshanova, Elena. "Proxy Re-encryption from Lattices." In Public-Key Cryptography – PKC 2014. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54631-0_5.
Pełny tekst źródłaShao, Jun, and Zhenfu Cao. "CCA-Secure Proxy Re-encryption without Pairings." In Public Key Cryptography – PKC 2009. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00468-1_20.
Pełny tekst źródłaStreszczenia konferencji na temat "Proxy public key cryptography"
Chen, Lei, Siyuan Ni, Yuyao Wang, Fei Yu, and Yuanhang He. "Content Security Distribution Scheme Based on Certificateless Public Key Cryptography." In 2024 IEEE 12th International Conference on Information, Communication and Networks (ICICN). IEEE, 2024. https://doi.org/10.1109/icicn62625.2024.10761210.
Pełny tekst źródłaHavanur, Smitha G., and Abey Jacob. "Approach to Post Quantum Cryptography Validation." In 2024 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA). IEEE, 2024. http://dx.doi.org/10.1109/pkia62599.2024.10727560.
Pełny tekst źródłaGervais, Mwitende. "Lightweight Certificateless Authenticated Key Agreement Protocol." In 10th International Conference on Artificial Intelligence & Applications. Academy & Industry Research Collaboration Center, 2023. http://dx.doi.org/10.5121/csit.2023.131928.
Pełny tekst źródłaPerlner, Ray A., and David A. Cooper. "Quantum resistant public key cryptography." In the 8th Symposium. ACM Press, 2009. http://dx.doi.org/10.1145/1527017.1527028.
Pełny tekst źródłaAbdulla, Mohamed, and Muhammad Ehsan Rana. "Vulnerabilities in Public Key Cryptography." In 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021). Atlantis Press, 2021. http://dx.doi.org/10.2991/ahis.k.210913.079.
Pełny tekst źródłaGupta, Anjali, and Muzzammil Hussain. "Secure Session Key Sharing Using Public Key Cryptography." In the Third International Symposium. ACM Press, 2015. http://dx.doi.org/10.1145/2791405.2791448.
Pełny tekst źródłaCaboara, Massimo, Fabrizio Caruso, and Carlo Traverso. "Gröbner bases for public key cryptography." In the twenty-first international symposium. ACM Press, 2008. http://dx.doi.org/10.1145/1390768.1390811.
Pełny tekst źródłaBatina, L., J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, and I. Verbauwhede. "Public-Key Cryptography for RFID-Tags." In Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07). IEEE, 2007. http://dx.doi.org/10.1109/percomw.2007.98.
Pełny tekst źródłaBoyarsky, Maurizio Kliban. "Public-key cryptography and password protocols." In the 6th ACM conference. ACM Press, 1999. http://dx.doi.org/10.1145/319709.319719.
Pełny tekst źródłaColeman, Tom A., James A. Kitchener, David L. Pudney, Kelvin D. Wauchope, and Braden J. Phillips. "An RNS public key cryptography accelerator." In Smart Materials, Nano- and Micro-Smart Systems, edited by Said F. Al-Sarawi. SPIE, 2006. http://dx.doi.org/10.1117/12.695962.
Pełny tekst źródłaRaporty organizacyjne na temat "Proxy public key cryptography"
Nechvatal, James. Public-key cryptography. National Institute of Standards and Technology, 1991. http://dx.doi.org/10.6028/nist.sp.800-2.
Pełny tekst źródłaBEAVER, CHERYL L., TIMOTHY J. DRAELOS, VICTORIA A. HAMILTON, et al. Low-Power Public Key Cryptography. Office of Scientific and Technical Information (OSTI), 2000. http://dx.doi.org/10.2172/767206.
Pełny tekst źródłaWakid, Shukri. Entity Authentication Using Public Key Cryptography. Defense Technical Information Center, 1997. http://dx.doi.org/10.21236/ada408513.
Pełny tekst źródłaTurner, S., D. Brown, K. Yiu, R. Housley, and T. Polk. Elliptic Curve Cryptography Subject Public Key Information. RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5480.
Pełny tekst źródłaGutmann, P., and C. Bonnell. Standard Public Key Cryptography (PKC) Test Keys. RFC Editor, 2023. http://dx.doi.org/10.17487/rfc9500.
Pełny tekst źródłaJonsson, J., and B. Kaliski. Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1. RFC Editor, 2003. http://dx.doi.org/10.17487/rfc3447.
Pełny tekst źródłaZhu, L., and B. Tung. Public Key Cryptography for Initial Authentication in Kerberos (PKINIT). RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4556.
Pełny tekst źródłaIto, T., and S. Turner. Clarifications for Elliptic Curve Cryptography Subject Public Key Information. RFC Editor, 2020. http://dx.doi.org/10.17487/rfc8813.
Pełny tekst źródłaZhu, L., K. Jaganathan, and K. Lauter. Elliptic Curve Cryptography (ECC) Support for Public Key Cryptography for Initial Authentication in Kerberos (PKINIT). RFC Editor, 2008. http://dx.doi.org/10.17487/rfc5349.
Pełny tekst źródłaCarroll, Thomas, Lindsey Redington, Addison Moran-Schmoker, and Andrew Murray. Inventory of Public Key Cryptography in US Electric Vehicle Charging. Office of Scientific and Technical Information (OSTI), 2023. http://dx.doi.org/10.2172/2204867.
Pełny tekst źródła