Ads
-
Related paper
- Review: Securing Broker-Less Public/Subscribe Systems Using Identity-Based Encryption
- IJSET@2014 Page 139 Public Key Encryption without using Certificate based on Identity Based Cryptography
- Survey of Identity-Based Encryption for Providing Security in Sender/Receiver Systems
- Securing the Dynamic Realm: A Comprehensive Review of ML Algorithms in IoT-Based Home Automation Systems and Beyond
- An Advanced Implementation for Cryptography and Encryption in Cloud Computing Using Identity Based Encryption Techniques
- A NOVEL ECG BASED ENCRYPTION ALGORITHM FOR SECURING PATIENT CONFIDENTIAL INFORMATION
- An Efficient Securing Code Based Cloud Storage using RC5 Encryption Algorithm against Pollution Attacks
- Securing the data in cloud using Algebra Homomorphic Encryption scheme based on updated Elgamal(AHEE)
- Novel Framework of Identity Based Encryption with CRA
- Pseudonym Generation with Combining the Identity Based and Attribute Based Encryption with Outsourced Revocation in Cloud Computing