2011 Seventh International Conference on Computational Intelligence and Security 2011
DOI: 10.1109/cis.2011.213
|View full text |Cite
|
Sign up to set email alerts
|

K-times Proxy Re-encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…Also, the adsorption technology has proven to be a sustainable system that has important advantages such as being driven by waste heat and low-grade heat sources such as solar energy and using environmentally friendly refrigerants such as water [10]. In a basic adsorption system ( Fig.…”
Section: Introductionmentioning
confidence: 99%
“…Also, the adsorption technology has proven to be a sustainable system that has important advantages such as being driven by waste heat and low-grade heat sources such as solar energy and using environmentally friendly refrigerants such as water [10]. In a basic adsorption system ( Fig.…”
Section: Introductionmentioning
confidence: 99%
“…Also, these systems were driven by electricity generated using fossil fuels. An alternative to the common cooling systems is adsorption technology which can be operated using waste heat or renewable energy sources (such as solar and geothermal energy) and uses environmentally friendly refrigerants such as water [6]. Adsorption desalination can also offer an innovative solution to another global crisis which is water scarcity [7] as by 2025, 1.8 billion human being will be living in absolute water scarcity regions [8][9][10].…”
mentioning
confidence: 99%
“…Because the proxy storage server is intrusted, it is desirable to fully restrict the proxy's ability. To obtain this goal, Wang et al , constructed a k ‐times proxy re‐encryption in 2011, and subsequently Purushothama et al , designed a limited proxy re‐encryption (L‐PRE) for enforcing access control in public cloud in 2013. They borrow the ideas of k ‐times signature in and in .…”
Section: Introductionmentioning
confidence: 99%