X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (206) 206
Patent (108) 108
Newspaper Article (94) 94
Book / eBook (39) 39
Conference Proceeding (35) 35
Government Document (15) 15
Magazine Article (12) 12
Book Chapter (8) 8
Book Review (3) 3
Dissertation (2) 2
Newsletter (2) 2
Streaming Video (2) 2
Trade Publication Article (2) 2
Transcript (2) 2
Web Resource (2) 2
Reference (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
trade secrets (123) 123
electricity (109) 109
electric communication technique (108) 108
jamming of communication (108) 108
secret communication (108) 108
transmission of digital information, e.g. telegraphiccommunication (101) 101
physics (88) 88
calculating (80) 80
computing (80) 80
counting (80) 80
cryptography (76) 76
electric digital data processing (63) 63
wireless communications networks (47) 47
computer science (42) 42
secret sharing (41) 41
data processing systems or methods, specially adapted foradministrative, commercial, financial, managerial, supervisoryor forecasting purposes (36) 36
systems or methods specially adapted for administrative,commercial, financial, managerial, supervisory or forecastingpurposes, not otherwise provided for (36) 36
intellectual property (34) 34
data encryption (32) 32
laws, regulations and rules (32) 32
computer security (31) 31
analysis (30) 30
cryptanalysis (28) 28
computers (27) 27
cryptology (27) 27
multi-user (27) 27
protection (27) 27
secret writing (27) 27
steganography (27) 27
privacy (26) 26
security (26) 26
security measures (26) 26
computer communication networks (24) 24
criptografía (24) 24
computer privacy (23) 23
congresses (23) 23
data encoding (23) 23
education (23) 23
encryption of data (23) 23
informatique (23) 23
telecommunications (23) 23
algorithms (22) 22
computer system security (22) 22
computer systems (22) 22
cyber security (22) 22
cybersecurity (22) 22
electronic digital computers (22) 22
espionage (22) 22
political science (22) 22
protection of computer systems (22) 22
security of computer systems (22) 22
computer science, information systems (21) 21
official secrets (21) 21
telephonic communication (21) 21
access control (20) 20
coding (20) 20
cryptography congresses (20) 20
data protection (20) 20
kongress (20) 20
law (20) 20
protección de datos (20) 20
studies (20) 20
computer security congresses (19) 19
encryption (19) 19
secret service (19) 19
advertising (18) 18
basic electronic circuitry (18) 18
checking-devices (18) 18
code conversion in general (18) 18
coin-freed or like apparatus (18) 18
decoding (18) 18
cloud computing (17) 17
data security (17) 17
information systems (17) 17
information technology (17) 17
internet (17) 17
management of computing and information systems (17) 17
national security (17) 17
systems and data security (17) 17
acquisitions & mergers (16) 16
algorithm analysis and problem complexity (16) 16
computer software (16) 16
display (16) 16
economics (16) 16
general tagging of cross-sectional technologies spanning over several sections of the ipc (16) 16
general tagging of new technological developments (16) 16
history (16) 16
proxy signature (16) 16
seals (16) 16
secret (16) 16
secret police (16) 16
technical subjects covered by former uspc cross-reference art collections [xracs] and digests (16) 16
toiletries industry (16) 16
coding or ciphering apparatus for cryptographic or otherpurposes involving the need for secrecy (15) 15
computer communication systems (15) 15
datensicherung (15) 15
kryptologie (15) 15
multiplex communication (15) 15
pictorial communication, e.g. television (15) 15
research (15) 15
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Robarts - Stacks (5) 5
UofT at Mississauga - Stacks (4) 4
Gerstein Science - Stacks (3) 3
UofT at Scarborough - Stacks (3) 3
Collection Dvlpm't (Acquisitions) - Vendor file (2) 2
St. Michael's College (John M. Kelly) - 2nd Floor (2) 2
Engineering & Comp. Sci. - Stacks (1) 1
UofT at Mississauga - Reference (1) 1
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Pervasive and Mobile Computing, ISSN 1574-1192, 06/2016, Volume 28, pp. 113 - 121
Bidirectional proxy re-encryption allows ciphertext transformation between Alice and Bob via a semi-trusted proxy, who however cannot obtain the corresponding plaintext... 
Cryptographic cloud storage | Replayable chosen-ciphertext attack | Multi-use | Bidirectional proxy re-encryption | Master secret security | Constant size | SCHEME | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | Cloud computing | Proxy | Cryptography | Analysis
Journal Article
International Journal of Theoretical Physics, ISSN 0020-7748, 2/2015, Volume 54, Issue 2, pp. 582 - 588
...Int J Theor Phys (2015) 54:582–588 DOI 10.1007/s10773-014-2250-2 Cryptanalysis of a Quantum Proxy Weak Blind Signature Scheme Ke-Jia Zhang · Heng-Yue Jia... 
Quantum cryptanalysis | Theoretical, Mathematical and Computational Physics | Quantum signature | Proxy signature | Quantum Physics | Physics, general | Blind signature | Physics | Elementary Particles, Quantum Field Theory | QSDC PROTOCOL | PHYSICS, MULTIDISCIPLINARY | KEY DISTRIBUTION | ATTACK | CLASSICAL MESSAGES | SECRET | CRYPTOGRAPHY | Proxy
Journal Article
Chinese Physics B, ISSN 1674-1056, 02/2008, Volume 17, Issue 2, pp. 415 - 418
Journal Article
Science China Physics, Mechanics and Astronomy, ISSN 1674-7348, 3/2013, Volume 56, Issue 3, pp. 519 - 523
In the YW threshold proxy quantum signature scheme proposed by Yang and Wen, it is found that the basic signature key is the same as the basic verification key, which means that the bitwise exclusive OR (XOR... 
threshold proxy signature | quantum signature | quantum cryptography | Physics, general | secret sharing | Physics | Classical Continuum Physics | Astronomy, Observations and Techniques | Secret sharing | Quantum cryptography | Threshold proxy signature | Quantum signature | STATES | PHYSICS, MULTIDISCIPLINARY | ENTANGLEMENT | NOISE | TELEPORTATION | SHARE | IDENTITY AUTHENTICATION | DIRECT COMMUNICATION | SECRET | Investment analysis | Proxy | Safety and security measures | Cryptography | Analysis | Astronomy
Journal Article
Computer Communications, ISSN 0140-3664, 06/2014, Volume 46, pp. 10 - 21
Journal Article
Modelirovanie i analiz informacionnyh sistem, ISSN 1818-1015, 03/2015, Volume 20, Issue 3, pp. 55 - 70
The paper presents an (n, t)-threshold proxy signature scheme with an Arbitrator which enables an original signer to delegate the signature authority to sign a message on behalf of the original signer to proxy group P of n members... 
threshold proxy signature | secret sharing | proxy signature
Journal Article
Tongxin Xuebao/Journal on Communications, ISSN 1000-436X, 11/2018, Volume 39, Issue 11, pp. 129 - 137
Journal Article
武汉大学学报:自然科学英文版, ISSN 1007-1202, 2007, Volume 12, Issue 1, pp. 155 - 158
Journal Article
Journal of Information Security and Applications, ISSN 2214-2126, 02/2020, Volume 50, p. 102411
We focus on proposing a threshold proxy re-encryption scheme for networks with resource constrained devices... 
Resource constrained networks | Quorum | Threshold secret sharing | Collusion resistance | Proxy re-encryption | COMPUTER SCIENCE, INFORMATION SYSTEMS
Journal Article
Journal of the Chinese Institute of Engineers, Transactions of the Chinese Institute of Engineers,Series A/Chung-kuo Kung Ch'eng Hsuch K'an, ISSN 0253-3839, 02/2018, Volume 41, Issue 2, pp. 141 - 148
The previous threshold proxy re-signature schemes have been mainly constructed with bilinear maps, the implementations of which are much more time-consuming than exponentiation operations... 
cryptography | proxy re-signature | secret sharing | Information security | SCHEME | ENGINEERING, MULTIDISCIPLINARY | SECRET
Journal Article
Proceedings of the 12th International Conference on availability, reliability and security, 08/2017, Volume 130521, pp. 1 - 8
.... This paper introduces the Archistar Backup Proxy which allows integration of multi-cloud storage into existing legacy enterprise computing landscapes by overloading the industry-standard Amazon S3 protocol... 
cloud storage | distributed system | backup system | secret sharing | Secret sharing | Distributed system | Backup system | Cloud storage
Conference Proceeding
Jisuanji Xuebao/Chinese Journal of Computers, ISSN 0254-4164, 04/2013, Volume 36, Issue 4, pp. 895 - 902
The motivation of this study comes from the work done by Weng et al, in which the proxy can only transform delegator's ciphertext with condition (keyword... 
CCA security | Secret sharing | Conditional proxy re-encryption | Random oracle model | Bilinear pairings | Email | Random numbers | Computer simulation | Keys | Emergencies | Computer information security | Proxy client servers | Gates
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2018, Volume 11066, pp. 16 - 25
Conference Proceeding
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, ISSN 1867-8211, 2019, Volume 284, pp. 521 - 537
Conference Proceeding
International Journal of Network Security, ISSN 1816-353X, 07/2017, Volume 19, Issue 4, pp. 623 - 630
Journal Article
09/2018
In one example, a method may include a telecommunication service provider detecting that a cellular device is located within a transmission-receiving distance... 
ELECTRIC COMMUNICATION TECHNIQUE | TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION | WIRELESS COMMUNICATIONS NETWORKS | COMPUTING | COUNTING | PHYSICS | ELECTRIC DIGITAL DATA PROCESSING | SECRET COMMUNICATION | ELECTRICITY | CALCULATING | JAMMING OF COMMUNICATION
Patent
Applied Mathematics and Computation, ISSN 0096-3003, 2003, Volume 136, Issue 2, pp. 315 - 321
Recently, Sun et al. pointed out some weaknesses of Zhang’s threshold proxy signature scheme and a disadvantage... 
Verifiable secret sharing | Threshold proxy signature | Nonrepudiation
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.