Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Deyu Qi
Cryptanalysis of a Multi-Use CCA-secure Proxy Re-Encryption Scheme
International Journal of Security and its Applications
Computer Science
Related publications
Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
IEEE Transactions on Information Theory
Computer Science Applications
Information Systems
Library
Information Sciences
Improved Functional Proxy Re-Encryption Schemes for Secure Cloud Data Sharing
Computer Science and Information Systems
Computer Science
Concise Multi-Challenge CCA-Secure Encryption and Signatures With Almost Tight Security
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
PRTA: A Proxy Re-Encryption Based Trusted Authorization Scheme for Nodes on CloudIoT
Information Sciences
Control
Systems Engineering
Management
Theoretical Computer Science
Computer Science Applications
Information Systems
Artificial Intelligence
Software
Cryptanalysis and Improvements of an Anonymous Multi-Receiver Identity-Based Encryption Scheme
IET Information Security
Computer Networks
Software
Information Systems
Communications
Key-Private Proxy Re-Encryption
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Privacy-Aware Transmission Scheme Based on Homomorphic Proxy Re-Encryption for NDN
International Journal of Security and Networks
Electronic Engineering
Risk
Computer Networks
Communications
Reliability
Electrical
Safety
Quality
An IND-CCA2 Secure Post-Quantum Encryption Scheme and a Secure Cloud Storage Use Case
Human-centric Computing and Information Sciences
Computer Science
Multi-Security-Level Cloud Storage System Based on Improved Proxy Re-Encryption
Eurasip Journal on Wireless Communications and Networking
Computer Networks
Computer Science Applications
Signal Processing
Communications