Secure Outsourced Bilinear Pairings Computation for Mobile Devices
暂无分享,去创建一个
[1] Junliang Chen,et al. Efficient Access Control of Sensitive Data Service in Outsourcing Scenarios , 2010, IACR Cryptol. ePrint Arch..
[2] Sathya Narayanan,et al. Mobile Device Data Security: A Cryptographic Approach by Outsourcing Mobile Data to Cloud , 2015 .
[3] Craig Gentry,et al. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.
[4] Hasan Omar Al-Sakran. ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT , 2015 .
[5] Junzuo Lai,et al. Self-Generated-Certificate Public Key Encryption Without Pairing , 2007, Public Key Cryptography.
[6] Sara Foresti,et al. Preserving Privacy in Data Outsourcing , 2010, Advances in Information Security.
[7] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[8] Jerzy Pejas,et al. Implicit and Explicit Certificates-Based Encryption Scheme , 2014, CISIM.
[9] Kenneth G. Paterson,et al. Pairings for Cryptographers , 2008, IACR Cryptol. ePrint Arch..
[10] Jianfeng Ma,et al. Efficient algorithms for secure outsourcing of bilinear pairings , 2015, Theor. Comput. Sci..
[11] Anna Lysyanskaya,et al. How to Securely Outsource Cryptographic Computations , 2005, TCC.
[12] David Naccache,et al. Secure Delegation of Elliptic-Curve Pairing , 2010, IACR Cryptol. ePrint Arch..
[13] Yang Lu,et al. Constructing Efficient Certificate-based Encryption with Paring , 2009, J. Comput..