Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Purushothama B. R.
On Efficient Access Control Mechanisms in Hierarchy Using Unidirectional and Transitive Proxy Re-Encryption Schemes
Related publications
Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
IEEE Transactions on Information Theory
Computer Science Applications
Information Systems
Library
Information Sciences
Improved Functional Proxy Re-Encryption Schemes for Secure Cloud Data Sharing
Computer Science and Information Systems
Computer Science
Key-Private Proxy Re-Encryption
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Type-Based Proxy Re-Encryption and Its Construction
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Proxy Re-Signature Schemes Without Random Oracles
Enhanced Attribute-Based Proxy Re-Encryption for Home Network
International Journal of Computer and Communication Engineering
Multi-Security-Level Cloud Storage System Based on Improved Proxy Re-Encryption
Eurasip Journal on Wireless Communications and Networking
Computer Networks
Computer Science Applications
Signal Processing
Communications
Privacy-Aware Transmission Scheme Based on Homomorphic Proxy Re-Encryption for NDN
International Journal of Security and Networks
Electronic Engineering
Risk
Computer Networks
Communications
Reliability
Electrical
Safety
Quality
PRTA: A Proxy Re-Encryption Based Trusted Authorization Scheme for Nodes on CloudIoT
Information Sciences
Control
Systems Engineering
Management
Theoretical Computer Science
Computer Science Applications
Information Systems
Artificial Intelligence
Software