Academic literature on the topic 'Privacy, proxy re-encryption, photo sharing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Privacy, proxy re-encryption, photo sharing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Privacy, proxy re-encryption, photo sharing"
Ma, Chunguang, Juyan Li, and Weiping Ouyang. "Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud Environment." International Journal of Foundations of Computer Science 28, no. 06 (September 2017): 645–60. http://dx.doi.org/10.1142/s0129054117400111.
Full textHu, Huidan, Yuanjian Zhou, Zhenfu Cao, and Xiaolei Dong. "Efficient and HRA Secure Universal Conditional Proxy Re-Encryption for Cloud-Based Data Sharing." Applied Sciences 12, no. 19 (September 24, 2022): 9586. http://dx.doi.org/10.3390/app12199586.
Full textRen, Chengdong, Xiaolei Dong, Jiachen Shen, Zhenfu Cao, and Yuanjian Zhou. "CLAP-PRE: Certificateless Autonomous Path Proxy Re-Encryption for Data Sharing in the Cloud." Applied Sciences 12, no. 9 (April 25, 2022): 4353. http://dx.doi.org/10.3390/app12094353.
Full textRen, Chengdong, Xiaolei Dong, Jiachen Shen, Zhenfu Cao, and Yuanjian Zhou. "CLAP-PRE: Certificateless Autonomous Path Proxy Re-Encryption for Data Sharing in the Cloud." Applied Sciences 12, no. 9 (April 25, 2022): 4353. http://dx.doi.org/10.3390/app12094353.
Full textChen, Yingwen, Bowen Hu, Hujie Yu, Zhimin Duan, and Junxin Huang. "A Threshold Proxy Re-Encryption Scheme for Secure IoT Data Sharing Based on Blockchain." Electronics 10, no. 19 (September 27, 2021): 2359. http://dx.doi.org/10.3390/electronics10192359.
Full textAlanazi, Fulayjan, Ahmed Elhadad, Safwat Hamad, and A. Ghareeb. "Sensors data collection framework using mobile identification with secure data sharing model." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (October 1, 2019): 4258. http://dx.doi.org/10.11591/ijece.v9i5.pp4258-4265.
Full textSukte, Chudaman Devidasrao, Emmanuel Mark, and Ratnadeep R. Deshmukh. "Efficient Cryptographic Protocol Design for Secure Sharing of Personal Health Records in the Cloud." International Journal of Information Technologies and Systems Approach 15, no. 1 (January 1, 2022): 1–16. http://dx.doi.org/10.4018/ijitsa.304810.
Full textWang, Xu, Xiaoyuan Yang, Cong Li, Yudong Liu, and Yong Ding. "Improved functional proxy re-encryption schemes for secure cloud data sharing." Computer Science and Information Systems 15, no. 3 (2018): 585–614. http://dx.doi.org/10.2298/csis171218024w.
Full textChen, Weizhe, Shunzhi Zhu, Jianmin Li, Jiaxin Wu, Chin-Ling Chen, and Yong-Yuan Deng. "Authorized Shared Electronic Medical Record System with Proxy Re-Encryption and Blockchain Technology." Sensors 21, no. 22 (November 22, 2021): 7765. http://dx.doi.org/10.3390/s21227765.
Full textObour Agyekum, Kwame, Qi Xia, Emmanuel Sifah, Jianbin Gao, Hu Xia, Xiaojiang Du, and Moshen Guizani. "A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain." Sensors 19, no. 5 (March 11, 2019): 1235. http://dx.doi.org/10.3390/s19051235.
Full textBook chapters on the topic "Privacy, proxy re-encryption, photo sharing"
Muthukumaran V. and Ezhilmaran D. "A Cloud-Assisted Proxy Re-Encryption Scheme for Efficient Data Sharing Across IoT Systems." In Research Anthology on Convergence of Blockchain, Internet of Things, and Security, 626–46. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-7132-6.ch035.
Full textAgarwal, Neha, Ajay Rana, J. P. Pandey, and Amit Agarwal. "Secured Sharing of Data in Cloud via Dual Authentication, Dynamic Unidirectional PRE, and CPABE." In Research Anthology on Artificial Intelligence Applications in Security, 504–27. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch025.
Full textAgarwal, Neha, Ajay Rana, J. P. Pandey, and Amit Agarwal. "Secured Sharing of Data in Cloud via Dual Authentication, Dynamic Unidirectional PRE, and CPABE." In Research Anthology on Artificial Intelligence Applications in Security, 504–27. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch025.
Full textConference papers on the topic "Privacy, proxy re-encryption, photo sharing"
Rabieh, Khaled, Suat Mercan, Kemal Akkaya, Vashish Baboolal, and Ramazan S. Aygun. "Privacy-Preserving and Efficient Sharing of Drone Videos in Public Safety Scenarios using Proxy Re-encryption." In 2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science (IRI). IEEE, 2020. http://dx.doi.org/10.1109/iri49571.2020.00015.
Full text