Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
11 |
Material Type: Livro
|
![]() |
Homomorphic Signature Schemes: A SurveyTraverso, Giulia ; Demirel, Denise ; Buchmann, JohannesCham: Springer International Publishing AG 2016Texto completo disponível |
12 |
Material Type: Livro
|
![]() |
Identity-Based EncryptionSarkar, Palash ; Chatterjee, SanjitNew York, NY: Springer Science + Business Media 2011Texto completo disponível |
13 |
Material Type: Artigo
|
![]() |
Attribute Based Encryption with Privacy Protection and Accountability for CloudIoTLi, Jiguo ; Zhang, Yichen ; Ning, Jianting ; Huang, Xinyi ; Poh, Geong Sen ; Wang, DebangIEEE transactions on cloud computing, 2022-04, Vol.10 (2), p.762-773 [Periódico revisado por pares]Piscataway: IEEETexto completo disponível |
14 |
Material Type: Artigo
|
![]() |
Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structuresXu, Jian ; Wei, Laiwen ; Zhang, Yu ; Wang, Andi ; Zhou, Fucai ; Gao, Chong-zhiJournal of network and computer applications, 2018-04, Vol.107, p.113-124 [Periódico revisado por pares]Elsevier LtdTexto completo disponível |
15 |
Material Type: Artigo
|
![]() |
A resource-efficient encryption algorithm for multimedia big dataAljawarneh, Shadi ; Yassein, Muneer Bani ; Talafha, We’am AdelMultimedia tools and applications, 2017-11, Vol.76 (21), p.22703-22724 [Periódico revisado por pares]New York: Springer USTexto completo disponível |
16 |
Material Type: Artigo
|
![]() |
A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy ProtectionHan, Dezhi ; Pan, Nannan ; Li, Kuan-ChingIEEE transactions on dependable and secure computing, 2022-01, Vol.19 (1), p.316-327Washington: IEEETexto completo disponível |
17 |
Material Type: Ata de Congresso
|
![]() |
Leakage-Abuse Attacks Against Searchable EncryptionCash, David ; Grubbs, Paul ; Perry, Jason ; Ristenpart, ThomasProceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015, p.668-679New York, NY, USA: ACMTexto completo disponível |
18 |
Material Type: Artigo
|
![]() |
A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in CloudsGe, Chunpeng ; Susilo, Willy ; Baek, Joonsang ; Liu, Zhe ; Xia, Jinyue ; Fang, LimingIEEE transactions on dependable and secure computing, 2022-09, Vol.19 (5), p.2907-2919Washington: IEEETexto completo disponível |
19 |
Material Type: Artigo
|
![]() |
Efficient attribute-based encryption with attribute revocation for assured data deletionXue, Liang ; Yu, Yong ; Li, Yannan ; Au, Man Ho ; Du, Xiaojiang ; Yang, BoInformation sciences, 2019-04, Vol.479, p.640-650 [Periódico revisado por pares]Elsevier IncTexto completo disponível |
20 |
Material Type: Artigo
|
![]() |
Selective encryption on ECG data in body sensor network based on supervised machine learningQiu, Han ; Qiu, Meikang ; Lu, ZhihuiInformation fusion, 2020-03, Vol.55, p.59-67 [Periódico revisado por pares]Elsevier B.VTexto completo disponível |