81 | Á¦¸ñ(Title) | Efficient Anonymous Broadcast Encryption with Adaptive Security | |
---|---|---|---|
ÀúÀÚ(Author) | Fu-Cai Zhou Mu-Qing Lin Yang Zhou Yu-Xi Li | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 09 NO. 11 PP. 4680 ~ 4700 2015. 11 | ||
82 | Á¦¸ñ(Title) | Efficient Certificate-Based Proxy Re-encryption Scheme forData Sharing in Public Clouds | |
ÀúÀÚ(Author) | Yang Lu | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 09 NO. 07 PP. 2703 ~ 2718 2015. 07 | ||
83 | Á¦¸ñ(Title) | A Novel Image Encryption Using Calligraphy Based Scan Method and Random Number | |
ÀúÀÚ(Author) | T Sivakumar R Venkatesan | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 09 NO. 06 PP. 2317 ~ 2337 2015. 06 | ||
84 | Á¦¸ñ(Title) | Practical Schemes for Tunable Secure Network Coding | |
ÀúÀÚ(Author) | Guangjun Liu | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 09 NO. 03 PP. 1193 ~ 1209 2015. 03 | ||
85 | Á¦¸ñ(Title) | Attribute Set Based Signature Secure in the Standard Model | |
ÀúÀÚ(Author) | Baohong Li Yinliang Zhao Hongping Zhao | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 09 NO. 04 PP. 1516 ~ 1528 2015. 04 | ||
86 | Á¦¸ñ(Title) | Enabling Fine-grained Access Control with Efficient Attribute Revocation and Policy Updating in Smart Grid | |
ÀúÀÚ(Author) | Hongwei Li Dongxiao Liu Khalid Alharbi Shenmin Zhang and Xiaodong Lin | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 09 NO. 04 PP. 1404 ~ 1423 2015. 04 | ||
87 | Á¦¸ñ(Title) | Low-Power Encryption Algorithm Block Cipher in JavaScript | |
ÀúÀÚ(Author) | Hwajeong Seo Howon Kim | ||
¼ö·ÏÀú³Î(Journal) | JICCE(Journal of information and communication convergence engineering) | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 12 NO. 04 PP. 0252 ~ 0256 2014. 12 | ||
88 | Á¦¸ñ(Title) | High-speed Hardware Design for the Twofish Encryption Algorithm | |
ÀúÀÚ(Author) | Choong-Mo Youn Beom-Geun Lee | ||
¼ö·ÏÀú³Î(Journal) | JICCE(Journal of information and communication convergence engineering) | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 03 NO. 04 PP. 0201 ~ 0204 2005. 12 | ||
89 | Á¦¸ñ(Title) | Attribute-Based Data Sharing with Flexible and Direct Revocation in Cloud Computing | |
ÀúÀÚ(Author) | inghui Zhang Xiaofeng Chen Jin Li Hui Li Fenghua Li | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 08 NO. 11 PP. 4028 ~ 4049 2014. 11 | ||
90 | Á¦¸ñ(Title) | A Study on the Encryption Model for Numerical Data | |
ÀúÀÚ(Author) | Ji-Hong Kim Tony Sahama | ||
¼ö·ÏÀú³Î(Journal) | JICCE(Journal of information and communication convergence engineering) | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 07 NO. 01 PP. 0030 ~ 0033 2009. 03 |
Copyright(c) Computer Science Engineering Research Information Center. All rights reserved.