A proxy re-encryption-based webmail and file sharing system for collaboration in cloud computing environment
暂无分享,去创建一个
[1] Markus Jakobsson,et al. On Quorum Controlled Asymmetric Proxy Re-encryption , 1999, Public Key Cryptography.
[2] Abdul Ghafoor,et al. CryptoNET: Design and implementation of the Secure Email System , 2009, 2009 Proceedings of the 1st International Workshop on Security and Communication Networks.
[3] Alexander L. Wijesinha,et al. A bare PC TLS Webmail Server , 2012, 2012 International Conference on Computing, Networking and Communications (ICNC).
[4] Anil Rawat,et al. Implementation and Security Analysis of a CallerId Augmented 2FA Setup for Secure Web-mail Access , 2010 .
[5] Robert H. Deng,et al. Efficient Unidirectional Proxy Re-Encryption , 2010, AFRICACRYPT.
[6] Yevgeniy Dodis,et al. Proxy cryptography revisted , 2003 .
[7] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[8] Robert H. Deng,et al. CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles , 2010, Science China Information Sciences.
[9] S. Sree Vivek,et al. Secure Cloud Storage and File Sharing , 2017, 2017 IEEE International Conference on Smart Cloud (SmartCloud).
[10] Matthew Green,et al. Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.
[11] Craig Gentry,et al. Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.
[12] Matthew Green,et al. Identity-Based Proxy Re-encryption , 2007, ACNS.
[13] Yevgeniy Dodis,et al. Proxy Cryptography Revisited , 2003, NDSS.
[14] Jie Wu,et al. Hierarchical attribute-based encryption for fine-grained access control in cloud storage services , 2010, CCS '10.
[15] C. Pandu Rangan,et al. Conditional Proxy Re-Encryption - A More Efficient Construction , 2011 .
[16] C. C. Sobin,et al. A special purpose proxy re-signature scheme , 2012, 2012 International Conference on Innovations in Information Technology (IIT).
[17] Duminda Wijesekera,et al. BPEL orchestration of secure webmail , 2006, SWS '06.
[18] Bharat S. Rawal. Proxy re-encryption architect for storing and sharing of cloud contents , 2020, Int. J. Parallel Emergent Distributed Syst..
[19] M. Mambo,et al. Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts (Special Section on Cryptography and Information Security) , 1997 .