Suchergebnisse - ElGamal‐based proxy re‐encryption algorithm
-
1
Autoren: et al.
Quelle: Journal of Supercomputing; Sep2023, Vol. 79 Issue 13, p14117-14145, 29p
-
2
Autoren:
Quelle: Cluster Computing; Oct2025, Vol. 28 Issue 7, p1-19, 19p
-
3
Autoren:
Quelle: Concurrency & Computation: Practice & Experience; 6/10/2024, Vol. 36 Issue 13, p1-26, 26p
Schlagwörter: CONSTRUCTION management, COLLUSION
-
4
Autoren:
Quelle: ZANCO Journal of Pure & Applied Sciences; 2025, Vol. 37 Issue 5, p79-98, 20p
-
5
Autoren: et al.
Quelle: Journal of Ambient Intelligence & Humanized Computing; Jan2022, Vol. 13 Issue 1, p469-482, 14p
-
6
Autoren:
Quelle: Journal of Ambient Intelligence & Humanized Computing; Feb2021, Vol. 12 Issue 2, p1943-1965, 23p
-
7
Autoren: et al.
Quelle: International Journal of Foundations of Computer Science; Dec2010, Vol. 21 Issue 6, p1049-1063, 15p
-
8
Autoren: et al.
Quelle: Web Technologies & Applications: 16th Asia-Pacific Web Conference, APWeb 2014, Changsha, China, September 5-7, 2014. Proceedings; 2014, p117-128, 12p
-
9
-
10
Autoren: et al.
Quelle: Applied Cryptography & Network Security (9783540727378); 2007, p288-306, 19p
-
11
Autoren: et al.
Quelle: International Journal of Machine Learning & Cybernetics; Mar2024, Vol. 15 Issue 3, p1025-1038, 14p
-
12
Autoren:
Quelle: Emerging Intelligent Computing Technology & Applications; 2009, p1025-1034, 10p
-
13
Autoren:
Quelle: Journal of Information Assurance & Security; 2019, Vol. 14 Issue 2, p48-66, 19p
Schlagwörter: INVESTMENT analysis, CRYPTOGRAPHY, PROXY
-
14
Autoren:
Quelle: Security & Communication Networks; 7/8/2022, p1-13, 13p
-
15
Autoren:
Quelle: Data Science & Management; Sep2024, Vol. 7 Issue 3, p238-255, 18p
-
16
Autoren:
Quelle: Wireless Personal Communications; Sep2021, Vol. 120 Issue 2, p1637-1657, 21p
Schlagwörter: MODULAR arithmetic, MATRIX inversion, FINITE fields, INFORMATION sharing, MATRICES (Mathematics)
-
17
Autoren: et al.
Quelle: IET Communications (Wiley-Blackwell); Apr2016, Vol. 10 Issue 6, p661-668, 8p
-
18
Autoren:
Quelle: Security in Computing & Communications: Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings; 2015, p277-289, 13p
-
19
Autoren: et al.
Quelle: Journal of Ambient Intelligence & Humanized Computing; Oct2016, Vol. 7 Issue 5, p623-631, 9p
-
20
Autoren: et al.
Quelle: International Journal of Network Management; Nov/Dec2024, Vol. 34 Issue 6, p1-19, 19p
Schlagwörter: DATA privacy, DATA encryption, ELECTRIC power consumption, PRIVACY, GRIDS (Cartography)
Full Text Finder
Nájsť tento článok vo Web of Science