Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering
Reference29 articles.
1. Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352
2. Mambo M, Usuda K, Okamoto E (1996) Proxy signature for delegating signature operation. In: Proceedings of the 3rd ACM conference on computer and communications security, New Delhi, India, pp. 48–57
3. Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Workshop on the theory and application of cryptographic techniques, Santa Barbara, CA, USA, pp. 47–53
4. Li J, Li J et al (2015) Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput 64(2):425–437
5. Hwang MS, Tzeng SF, Tsai CS (2004) Generalization of proxy signature based on elliptic curves. Comput Stand Interfaces 26(2):73–84
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献