-
1
-
2
-
3
-
4
-
5“... improves the security of the image in the transmission process. Next, we process the image in the cloud...”
Get full text
Article -
6“... proposed a security and efficient multi-authority ABE scheme from lattices in this paper. The scheme...”
Get full text
Article -
7
-
8
-
9
-
10
-
11
-
12
-
13
-
14“... instigated a momentous research interest in the field of Vehicular Ad Hoc Network (VANET) security...”
Get full text
Article -
15“... the network, thereby sharing all nodes data. This process can be implemented by using a publish/subscribe (pub...”
Get full text
Article -
16“... signcryption schemes were proposed recently. But both of them were merely proved to be secure in the random...”
Get full text
Article -
17“... with greater security. Meanwhile, they put forward an idea of constructing signature schemes on the basis...”
Get full text
Article -
18“... critically important and promising technique which provides secure search over encrypted data in cloud...”
Get full text
Article -
19“... development of blockchain applications, the privacy and security issues of Ethereum have gradually emerged...”
Get full text
Article -
20“... to present improved security schemes. With this aim, an efficient public key encryption scheme with equality...”
Get full text
Article