全部 |
  • 全部
  • 题名
  • 关键词
  • NSTL主题词
  • 摘要
  • 论文-出处
  • 论文-作者
  • 论文-机构
  • 论文-DOI
  • 期刊-出版者
  • 期刊-出版地
  • 期刊-主编
  • ISSN
  • EISSN
  • ISBN
  • EISBN
检索 搜索期刊 二次检索 AI检索
外文文献 中文文献
筛选条件:

1. Certificateless Proxy Re-encryption with Cryptographic Reverse Firewalls for Secure Cloud Data Sharing NSTL国家科技图书文献中心

Nabeil Eltayieb |  Rashad Elhabob... -  《Future generations computer systems》 - 2025,162(Jan.) - 107478.1~107478.14 - 共14页

摘要: Reencryption with Cryptographic Reverse Firewall for Secure | Cloud computing has enabled data-sharing to be |  more convenient than ever before. However, data |  security is a major concern that prevents cloud computing |  from being widely adopted. A potential solution to
关键词: Cloud computing |  Certificateless |  Cryptographic reverse firewalls |  Data sharing |  Revocation

2. Equality Test on Identity-Based Encryption With Cryptographic Reverse Firewalls for Telemedicine Systems NSTL国家科技图书文献中心

Rashad Elhabob |  Nabeil Eltayieb... -  《IEEE internet of things journal》 - 2025,12(2) - 2106~2121 - 共16页

摘要: cryptographic reverse firewalls (ET-IBE-CRFs). This protocol |  cryptographic reverse firewalls (CRFs), the ET-IBE-CRF | The emergence of the COVID-Omicron XBB variant |  has intensified the need for wireless body area |  networks (WBANs) in telemedicine, underscoring their
关键词: Encryption |  Telemedicine |  Firewalls (computing) |  Public key |  Servers |  Medical services |  COVID-19

3. Equality Test Public Key Encryption With Cryptographic Reverse Firewalls for Cloud-Based E-Commerce NSTL国家科技图书文献中心

Rashad Elhabob |  Nabeil Eltayieb... -  《IEEE Transactions on Consumer Electronics》 - 2024,70(4) - 6763~6775 - 共13页

摘要: reverse firewalls (CRFs) were proposed. However |  reverse firewalls (ET-PKE-CRF) approach. The performance |  via covert backdoors. To tackle this, cryptographic |  equality test public key encryption with cryptographic | The rise of e-commerce and the adoption of
关键词: Public key |  Encryption |  Servers |  Security |  Firewalls (computing) |  Electronic commerce |  Protocols

4. Generic Construction: Cryptographic Reverse Firewalls for Public Key Encryption With Keyword Search in Cloud Storage NSTL国家科技图书文献中心

Yang Ming |  Hang Liu... -  《IEEE transactions on cloud computing》 - 2024,12(2) - 405~418 - 共14页

摘要: cryptographic reverse firewalls (CRF). Public key encryption |  with keyword search with cryptographic reverse |  with keyword search (PEKS) as a cryptographic |  firewalls to overcome the privacy leakage issue in cloud | The Snowden incident illustrates that an
关键词: Protocols |  Encryption |  Security |  Public key |  Keyword search |  Cryptography |  Cloud computing

5. Searchable Public-Key Encryption With Cryptographic Reverse Firewalls for Cloud Storage EI 工程索引 NSTL国家科技图书文献中心

Yuyang Zhou |  Zhebin Hu... -  《IEEE transactions on cloud computing》 - 2023,11(1) - 383~396 - 共14页 - 被引量:12

摘要: cryptographic reverse firewalls (SPKE-CRF), and use the JPBC | In order to protect data privacy in cloud |  storage, sensitive data is encrypted before being |  uploaded to a cloud server. How to retrieve ciphertext |  safely and effectively has become a problem. Public key
关键词: Cloud computing |  Servers |  Cryptography |  Encryption |  Resists |  Public key |  Search problems

6. SR-PEKS: Subversion-Resistant Public Key Encryption With Keyword Search NSTL国家科技图书文献中心

Changsong Jiang |  Chunxiang Xu... -  《IEEE transactions on cloud computing》 - 2023,11(3) - 3168~3183 - 共16页 - 被引量:8

摘要:-resistant PEKS scheme based on cryptographic reverse |  firewalls (CRF). In SR-PEKS, CRF sanitizes messages | Public key encryption with keyword search |  (PEKS) provides secure searchable data encryption in |  cloud storage. Users can outsource encrypted data and
关键词: Cloud computing |  Servers |  Encryption |  Security |  Keyword search |  Public key |  Protocols

7. Cryptographic reverse firewalls for interactive proof systems NSTL国家科技图书文献中心

Ganesh, Chaya |  Magri, Bernardo... -  《Theoretical computer science》 - 2021,855 - 104~132 - 共29页 - 被引量:1

摘要:We study interactive proof systems (IPSes) in |  a strong adversarial setting where the machines of |  honest parties might be corrupted and under control of |  the adversary. Our aim is to answer the following | , seemingly paradoxical, questions:
关键词: Subversion |  Algorithm-substitution attacks |  Cryptographic reverse firewalls |  Interactive proofs |  Zero knowledge |  Witness indistinguishability

8. Digital signature with cryptographic reverse firewalls EI 工程索引 SCOPUS Scopus数据库 SCIE Web of Science核心 NSTL国家科技图书文献中心

Ouyang, Mengdi |  Wang, Ziqing... -  《Journal of systems architecture》 - 2021,116 - 共11页 - 被引量:5

摘要: Reverse Firewalls (CRFs), one mean to resolve the |  great threats from internal adversaries. Cryptographic | The Snowden's Prism incident warned people |  problem, are increasingly popular on account of its |  simplicity and convenience. The current related CRFs
关键词: Cryptographic reverse firewall |  Signature |  Exfiltration resistance

9. Certificateless public key encryption with cryptographic reverse firewalls EI 工程索引 SCOPUS Scopus数据库 SCIE Web of Science核心 NSTL国家科技图书文献中心

Zhou, Yuyang |  Guo, Jing... -  《Journal of systems architecture》 - 2020,109 - 共10页 - 被引量:18

摘要: for solving this problem: cryptographic reverse | The Snowden incident shows that powerful |  attackers can compromise users' machines to steal users | ' private information. Currently, many encryption schemes |  that have proven to be secure cannot detect
关键词: Certificateless public key encryption |  Cryptographic reverse firewall |  Exfiltration resistance |  Certificateless public key signature

10. SM9 Key Encapsulation Mechanism for Power Monitoring Systems

Hong, Chao |  Xiao, Peng... -  《International Journal of Advanced Computer Science and Applications》 - 2025,16(1) - 1269~1277 - 共9页

摘要: cryptographic reverse firewalls maintain functionality, weakly |  and cryptographic reverse firewall. In order to |  reverse firewalls at the terminals and proved that the |  resist the backdoor attacks, we deployed cryptographic | The boundaries of the new power system network
关键词: SM9 |  Outsourced decryption |  cryptographic reverse firewall |  power monitoring systems
检索条件Cryptographic reverse firewalls
  • 检索词扩展

NSTL主题词

  • NSTL学科导航