已选(0)清除
条数/页: 排序方式:
|
| An identity-based conditional proxy re-encryption in cloud computing environments 会议论文 Applied Mechanics and Materials 作者: Meng,Xian Yong; Chen,Zhong; Meng,Xiang Yu; Sun,Bing
 收藏  |  浏览/下载:1/0  |  提交时间:2025/08/05
|
| A novel proxy re-encryption with keyword search 会议论文 Applied Mechanics and Materials, chn,Shenzhen, 2014-07-19——2014-07-19 作者: Meng,Xian Yong; Chen,Zhong; Meng,Xiang Yu
 收藏  |  浏览/下载:2/0  |  提交时间:2025/08/05
|
| Hierarchical identity-based encryption without key delegation in decryption 期刊论文 International Journal of Grid and Utility Computing,2014, 卷号: 5, 期号: 2, 页码: 71-79 作者: Luo,Song; Chen,Zhong
 收藏  |  浏览/下载:1/0  |  提交时间:2025/08/05
|
| Dual system encryption revisited: Attaining fully secure identity-based encryption and its extensions 期刊论文 Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology,2012, 卷号: 34, 期号: 2, 页码: 6-9 作者: Luo,Song; Chen,Yu; Chen,Zhong
 收藏  |  浏览/下载:0/0  |  提交时间:2025/08/05
|