Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Karyn Benson
Key-Private Proxy Re-Encryption
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Related publications
Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
IEEE Transactions on Information Theory
Computer Science Applications
Information Systems
Library
Information Sciences
Building Key-Private Public-Key Encryption Schemes
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Type-Based Proxy Re-Encryption and Its Construction
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Enhanced Attribute-Based Proxy Re-Encryption for Home Network
International Journal of Computer and Communication Engineering
Secure Cloud Storage Using Secret Key Sharing and Proxy Re-Encryption Based Third Party Auditing Service
International Journal of Engineering and Advanced Technology
Engineering
Computer Science Applications
Environmental Engineering
Improved Functional Proxy Re-Encryption Schemes for Secure Cloud Data Sharing
Computer Science and Information Systems
Computer Science
Cryptanalysis of a Multi-Use CCA-secure Proxy Re-Encryption Scheme
International Journal of Security and its Applications
Computer Science
Multi-Security-Level Cloud Storage System Based on Improved Proxy Re-Encryption
Eurasip Journal on Wireless Communications and Networking
Computer Networks
Computer Science Applications
Signal Processing
Communications
Privacy-Aware Transmission Scheme Based on Homomorphic Proxy Re-Encryption for NDN
International Journal of Security and Networks
Electronic Engineering
Risk
Computer Networks
Communications
Reliability
Electrical
Safety
Quality