共 50 条
- [3] On the security model for proxy re-encryption Journal of Information and Computational Science, 2010, 7 (09): : 1951 - 1958
- [4] Proxy Re-Encryption Based on Homomorphic Encryption 33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 154 - 161
- [5] Proxy Re-encryption Schemes for IoT and Crowd Sensing 2016 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2016,
- [6] Proxy Re-encryption with Unforgeable Re-encryption Keys CRYPTOLOGY AND NETWORK SECURITY, CANS 2014, 2014, 8813 : 20 - 33
- [7] QR Code Security using Proxy Re-Encryption PROCEEDINGS OF IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2016), 2016,
- [8] DEVELOPMENT ON SECURITY MODELS FOR PROXY RE-ENCRYPTION SCHEMES JP JOURNAL OF ALGEBRA NUMBER THEORY AND APPLICATIONS, 2024, 63 (01): : 1 - 21
- [9] Blockchain based Proxy Re-Encryption Scheme for Secure IoT Data Sharing 2019 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (ICBC), 2019, : 99 - 103
- [10] Secure Multicast using Proxy Re-Encryption in an IoT Environment KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (02): : 946 - 959