Artykuły w czasopismach na temat „Proxy public key cryptography”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Proxy public key cryptography”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Chen, Jiahui, Jie Ling, Jianting Ning, et al. "Post quantum proxy signature scheme based on the multivariate public key cryptographic signature." International Journal of Distributed Sensor Networks 16, no. 4 (2020): 155014772091477. http://dx.doi.org/10.1177/1550147720914775.
Pełny tekst źródłaK. Sudharani, Ms, and Dr N. K. Sakthivel. "Design and development of a secure certificateless proxy signature based (SE-CLPS) encryption scheme for cloud storage." International Journal of Engineering & Technology 10, no. 1 (2021): 57. http://dx.doi.org/10.14419/ijet.v10i1.21480.
Pełny tekst źródłaChadrakala and C. Lingareddy S. "Secure and Efficient Bi-Directional Proxy Re-Encyrption Technique." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 3 (2018): 1143–50. https://doi.org/10.11591/ijeecs.v12.i3.pp1143-1150.
Pełny tekst źródłaKim, Won-Bin, Su-Hyun Kim, Daehee Seo, and Im-Yeong Lee. "Broadcast Proxy Reencryption Based on Certificateless Public Key Cryptography for Secure Data Sharing." Wireless Communications and Mobile Computing 2021 (December 16, 2021): 1–16. http://dx.doi.org/10.1155/2021/1567019.
Pełny tekst źródłaWang, Su Li, and Jun Yao Ye. "Applied-Information Technology in Certificateless Proxy Signature Scheme without Bilinear Pairings." Applied Mechanics and Materials 685 (October 2014): 532–35. http://dx.doi.org/10.4028/www.scientific.net/amm.685.532.
Pełny tekst źródłaB M, Chandrakala, and S. C. Linga Reddy. "Secure and Efficient Bi-Directional Proxy Re-Encyrption Technique." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 3 (2018): 1143. http://dx.doi.org/10.11591/ijeecs.v12.i3.pp1143-1150.
Pełny tekst źródłaMohd, Saiful Adli Mohamad, Din Roshidi, and Ilyani Ahmad Jasmin. "Research trends review on RSA scheme of asymmetric cryptography techniques." Bulletin of Electrical Engineering and Informatics 10, no. 1 (2021): 487–92. https://doi.org/10.11591/eei.v10i1.2493.
Pełny tekst źródłaWang, Yi. "Structure and Analysis of Certificateless Proxy Blind Signature Scheme without Bilinear Pairing." Advanced Materials Research 734-737 (August 2013): 3194–98. http://dx.doi.org/10.4028/www.scientific.net/amr.734-737.3194.
Pełny tekst źródłaREN, YANLI, DAWU GU, SHUOZHONG WANG, and XINPENGU ZHANG. "HIERARCHICAL IDENTITY-BASED PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES." International Journal of Foundations of Computer Science 21, no. 06 (2010): 1049–63. http://dx.doi.org/10.1142/s0129054110007726.
Pełny tekst źródłaMishra, Bharati, Debasish Jena, Ramasubbareddy Somula, and S. Sankar. "Secure Key Storage and Access Delegation Through Cloud Storage." International Journal of Knowledge and Systems Science 11, no. 4 (2020): 45–64. http://dx.doi.org/10.4018/ijkss.2020100104.
Pełny tekst źródłaS., Sree Vivek, Sharmila Deva Selvi S., Radhakishan V., and Pandu Rangan C. "EFFICIENT CONDITIONAL PROXY RE-ENCRYPTION WITH CHOSEN CIPHER TEXT SECURITY." International Journal of Network Security & Its Applications (IJNSA) 4, no. 2 (2012): 179 to 199. https://doi.org/10.5281/zenodo.3353830.
Pełny tekst źródłaZhou, Yousheng, Yurong Li, and Yuanni Liu. "A Certificateless and Dynamic Conditional Proxy Re-encryption-based Data Sharing Scheme for IoT Cloud." Journal of Internet Technology 26, no. 2 (2025): 165–72. https://doi.org/10.70003/160792642025032602002.
Pełny tekst źródłaB.Swarajya, Lakshmi. "Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity checking in Public Cloud." Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity checking in Public Cloud 5, no. 22 (2018): 744–57. https://doi.org/10.5281/zenodo.7856210.
Pełny tekst źródłaPang, Liaojun, Jie Yang, and Zhengtao Jiang. "A Survey of Research Progress and Development Tendency of Attribute-Based Encryption." Scientific World Journal 2014 (2014): 1–13. http://dx.doi.org/10.1155/2014/193426.
Pełny tekst źródłaLi, Juyan, Chunguang Ma, and Zhen Gu. "Multi-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input Setting." International Journal of Foundations of Computer Science 31, no. 05 (2020): 551–67. http://dx.doi.org/10.1142/s0129054120500252.
Pełny tekst źródłaYang, Hai Bin, Juan Li Sun, Xu An Wang, and Jian Cui. "Proxy Re-Signature Scheme from CBS to IBS." Advanced Materials Research 304 (July 2011): 355–58. http://dx.doi.org/10.4028/www.scientific.net/amr.304.355.
Pełny tekst źródłaB.Swarajya, Lakshmi1 A.D.Sivarama Kumar2. "Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity checking in Public Cloud." Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity checking in Public Cloud 05, no. 22 (2018): 744–55. https://doi.org/10.5281/zenodo.7810823.
Pełny tekst źródłaWu, Faguo, Bo Zhou, and Xiao Zhang. "Identity-Based Proxy Signature with Message Recovery over NTRU Lattice." Entropy 25, no. 3 (2023): 454. http://dx.doi.org/10.3390/e25030454.
Pełny tekst źródłaBukkawar, Mrunali, and Mohd Shafi Pathan. "Web-Proxy-Based Authentication and Authorization Mechanism Against Client-Based HTTP Attacks." International Journal of Synthetic Emotions 8, no. 1 (2017): 60–72. http://dx.doi.org/10.4018/ijse.2017010105.
Pełny tekst źródłaUshamani, G. D* Dr Y.C Kiran. "SECURE AND EFFICIENT DATA INTEGRITY PROOF AND RECOVERING DATA FOR IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING IN CLOUD COMPUTING (IB-PODUC)." Global Journal of Engineering Science and Research Management 4, no. 5 (2017): 51–57. https://doi.org/10.5281/zenodo.573506.
Pełny tekst źródłaZhou, Yunhong, Na Li, Yanmei Tian, Dezhi An, and Licheng Wang. "Public Key Encryption with Keyword Search in Cloud: A Survey." Entropy 22, no. 4 (2020): 421. http://dx.doi.org/10.3390/e22040421.
Pełny tekst źródłaDong, Siyue, Zhen Zhao, Baocang Wang, Wen Gao, and Shanshan Zhang. "Certificateless Encryption Supporting Multi-Ciphertext Equality Test with Proxy-Assisted Authorization." Electronics 12, no. 20 (2023): 4326. http://dx.doi.org/10.3390/electronics12204326.
Pełny tekst źródłaBhatti, David Samuel, Salbia Sidrat, Shahzad Saleem, et al. "Performance analysis: Securing SIP on multi-threaded/multi-core proxy server using public keys on Diffie–Hellman (DH) in single and multi-server queuing scenarios." PLOS ONE 19, no. 1 (2024): e0293626. http://dx.doi.org/10.1371/journal.pone.0293626.
Pełny tekst źródłaKhan, Farhad Ullah, Fahad Algarni, Insaf Ullah, et al. "A Hyperelliptic Curve Cryptosystem Based Proxy Promised Signcryption Scheme." Security and Communication Networks 2022 (April 27, 2022): 1–10. http://dx.doi.org/10.1155/2022/1232336.
Pełny tekst źródłaZhang, Minqing, Xu An Wang, Xiaoyuan Yang, and Weihua Li. "New Construction of PVPKE Scheme and Its Application in Information Systems and Mobile Communication." Mobile Information Systems 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/430797.
Pełny tekst źródłaMinaei, Mohsen, Pedro Moreno-Sanchez, and Aniket Kate. "MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies." Proceedings on Privacy Enhancing Technologies 2020, no. 3 (2020): 404–24. http://dx.doi.org/10.2478/popets-2020-0058.
Pełny tekst źródłaZengin, Benjamin, Paulin Deupmann, Nicolas Buchmann, and Marian Margraf. "Chosen-Ciphertext Secure Unidirectional Proxy Re-Encryption Based on Asymmetric Pairings." Applied Sciences 14, no. 23 (2024): 11322. https://doi.org/10.3390/app142311322.
Pełny tekst źródłaWang, Xu, Xiaoyuan Yang, Cong Li, Yudong Liu, and Yong Ding. "Improved functional proxy re-encryption schemes for secure cloud data sharing." Computer Science and Information Systems 15, no. 3 (2018): 585–614. http://dx.doi.org/10.2298/csis171218024w.
Pełny tekst źródłaSukte, Chudaman Devidasrao, Emmanuel Mark, and Ratnadeep R. Deshmukh. "Efficient Cryptographic Protocol Design for Secure Sharing of Personal Health Records in the Cloud." International Journal of Information Technologies and Systems Approach 15, no. 1 (2022): 1–16. http://dx.doi.org/10.4018/ijitsa.304810.
Pełny tekst źródłaWei, Zhang. "A Pairing-based Homomorphic Encryption Scheme for Multi-User Settings." International Journal of Technology and Human Interaction 12, no. 2 (2016): 72–82. http://dx.doi.org/10.4018/ijthi.2016040106.
Pełny tekst źródłaXiao, Yao, Lei Xu, Zikang Chen, Can Zhang, and Liehuang Zhu. "A Blockchain-Based Data Sharing System with Enhanced Auditability." Mathematics 10, no. 23 (2022): 4494. http://dx.doi.org/10.3390/math10234494.
Pełny tekst źródłaHylock, Ray Hales, and Xiaoming Zeng. "A Blockchain Framework for Patient-Centered Health Records and Exchange (HealthChain): Evaluation and Proof-of-Concept Study." Journal of Medical Internet Research 21, no. 8 (2019): e13592. http://dx.doi.org/10.2196/13592.
Pełny tekst źródłaMohapatra, Pradosh Kumar. "Public key cryptography." XRDS: Crossroads, The ACM Magazine for Students 7, no. 1 (2000): 14–22. http://dx.doi.org/10.1145/351092.351098.
Pełny tekst źródłaLiestyowati, Dwi. "Public Key Cryptography." Journal of Physics: Conference Series 1477 (March 2020): 052062. http://dx.doi.org/10.1088/1742-6596/1477/5/052062.
Pełny tekst źródłaGarfinkel, S. L. "Public key cryptography." Computer 29, no. 6 (1996): 101–4. http://dx.doi.org/10.1109/2.507642.
Pełny tekst źródłaOdlyzko, Andrew M. "Public Key Cryptography." AT&T Technical Journal 73, no. 5 (1994): 17–23. http://dx.doi.org/10.1002/j.1538-7305.1994.tb00606.x.
Pełny tekst źródłaLiu, Ke Ning, Jun Yao Ye, and Ying Lian Wang. "A New Certificateless Forward Secure Proxy Signcryption Scheme." Applied Mechanics and Materials 685 (October 2014): 659–62. http://dx.doi.org/10.4028/www.scientific.net/amm.685.659.
Pełny tekst źródłaAbdulla, Mohamed. "Vulnerabilities in Public Key Cryptography." International Journal of Psychosocial Rehabilitation 24, no. 5 (2020): 3881–86. http://dx.doi.org/10.37200/ijpr/v24i5/pr202096.
Pełny tekst źródłaFischer, Addison. "Public Key Cryptography in Action." Information Systems Security 3, no. 1 (1994): 57–70. http://dx.doi.org/10.1080/10658989409342446.
Pełny tekst źródłaCrenshaw, Scott. "Speedy public key cryptography system." Network Security 2000, no. 3 (2000): 6. http://dx.doi.org/10.1016/s1353-4858(00)03013-0.
Pełny tekst źródłaKak, S. C. "Secret-hardware public-key cryptography." IEE Proceedings E Computers and Digital Techniques 133, no. 2 (1986): 94. http://dx.doi.org/10.1049/ip-e.1986.0010.
Pełny tekst źródłaLuo, Jiaoyan, Liming Zuo, and Hao Liu. "Quantum-Resistant Lattice-Based Proxy Signature." Symmetry 17, no. 2 (2025): 261. https://doi.org/10.3390/sym17020261.
Pełny tekst źródłaNAGY, NAYA, MARIUS NAGY, and SELIM G. AKL. "KEY DISTRIBUTION VERSUS KEY ENHANCEMENT IN QUANTUM CRYPTOGRAPHY." Parallel Processing Letters 20, no. 03 (2010): 239–50. http://dx.doi.org/10.1142/s0129626410000193.
Pełny tekst źródłaLin, Chu-Hsing. "Hierarchical key assignment without public-key cryptography." Computers & Security 20, no. 7 (2001): 612–19. http://dx.doi.org/10.1016/s0167-4048(01)00711-8.
Pełny tekst źródłaShaheena, Khatoon, and Singh Thakur Balwant. "CERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHY." International Journal of Network Security & Its Applications (IJNSA) 7, no. 2 (2015): 55–59. https://doi.org/10.5281/zenodo.7988379.
Pełny tekst źródłaTsvetov, V. P. "FRACTAL MAGMAS AND PUBLIC-KEY CRYPTOGRAPHY." Vestnik of Samara University. Natural Science Series 26, no. 2 (2021): 23–49. http://dx.doi.org/10.18287/2541-7525-2020-26-2-23-49.
Pełny tekst źródłaLefton, Phyllis. "Number Theory and Public-Key Cryptography." Mathematics Teacher 84, no. 1 (1991): 54–63. http://dx.doi.org/10.5951/mt.84.1.0054.
Pełny tekst źródłaZHANG, Fu-Tai, Yin-Xia SUN, Lei ZHANG, Man-Man GENG, and Su-Juan LI. "Research on Certificateless Public Key Cryptography." Journal of Software 22, no. 6 (2011): 1316–32. http://dx.doi.org/10.3724/sp.j.1001.2011.04007.
Pełny tekst źródłaROSAMOND, Frances. "Computational Thinking Enrichment: Public-Key Cryptography." Informatics in Education 17, no. 1 (2018): 93–103. http://dx.doi.org/10.15388/infedu.2018.06.
Pełny tekst źródłaKrishna, Addepalli V. N., and Addepalli Hari Narayana. "Cubic spline curve public key cryptography." Journal of Discrete Mathematical Sciences and Cryptography 20, no. 2 (2017): 453–61. http://dx.doi.org/10.1080/09720529.2015.1112512.
Pełny tekst źródła