From post

RSA-Based Collusion Resistant Quorum Controlled Proxy Re-encryption Scheme for Distributed Secure Communication.

, и . ICDCIT, том 11319 из Lecture Notes in Computer Science, стр. 349-363. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Proxy visible re-encryption scheme with application to e-mail forwarding., и . SIN, стр. 212-217. ACM, (2017)Design of an Efficient Verification Scheme for Correctness of Outsourced Computations in Cloud Computing., , , , и . SSCC, том 536 из Communications in Computer and Information Science, стр. 66-77. Springer, (2015)Secure and verifiable outsourcing of Euclidean distance and closest pair of points with single untrusted cloud server., и . Int. J. Internet Protoc. Technol., 16 (1): 34-45 (2023)Provably secure public key cryptosystem with limited number of encryptions for authorised sharing of outsourced data., и . Int. J. Cloud Comput., 4 (4): 317-334 (2015)DR-PRE: dual receiver proxy re-encryption scheme., и . Inf. Secur. J. A Glob. Perspect., 29 (2): 62-72 (2020)TP-PRE: threshold progressive proxy re-encryption, its definitions, construction and applications., и . J. Ambient Intell. Humaniz. Comput., 12 (2): 1943-1965 (2021)Pixel co-ordinate-based secret image sharing scheme with constant size shadow images., и . Comput. Electr. Eng., (2021)Design and Implementation of Secure Internet Based Voting System with User Anonymity Using Identity Based Encryption System., и . IEEE SCC, стр. 474-481. IEEE Computer Society, (2009)User driven general framework to cap the joins in secure group communication., и . Int. J. Inf. Comput. Secur., 23 (2): 190-199 (2024)A Practical and Efficient Key-Aggregate Cryptosystem for Dynamic Access Control in Cloud Storage., и . ICDCIT, том 14501 из Lecture Notes in Computer Science, стр. 133-148. Springer, (2024)