Suchergebnisse - ElGamal‐based proxy re‐encryption algorithm

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    Quelle: Web Technologies & Applications: 16th Asia-Pacific Web Conference, APWeb 2014, Changsha, China, September 5-7, 2014. Proceedings; 2014, p117-128, 12p

  9. 9

    Autoren: Tang, Qiang

    Quelle: Progress in Cryptology - INDOCRYPT 2008; 2008, p130-144, 15p

  10. 10

    Quelle: Applied Cryptography & Network Security (9783540727378); 2007, p288-306, 19p

  11. 11
  12. 12

    Autoren: Ma, Chunbo Ao, Jun

    Quelle: Emerging Intelligent Computing Technology & Applications; 2009, p1025-1034, 10p

  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    Quelle: Security in Computing & Communications: Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings; 2015, p277-289, 13p

  19. 19

    Quelle: Journal of Ambient Intelligence & Humanized Computing; Oct2016, Vol. 7 Issue 5, p623-631, 9p

  20. 20