2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT) 2016
DOI: 10.1109/iccicct.2016.7987923
|View full text |Cite
|
Sign up to set email alerts
|

Secure and efficient bi-directional proxy re-encyrption technique

Abstract: The low cost availability of smart devices and broadband connection has led to rapid growth of communication over Internet. As of today the internet based communication service is widely used in various application services such as in E-Mail transaction of sensitive data (medical data), online money transaction etc. all these services requires a strong security. There has been continuous ongoing research by various cryptanalyst to enhance security of cryptography especially in semi-untrusted server. However, p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 19 publications
0
1
0
Order By: Relevance
“…Quantitative evaluation for computer network security [21][22][23][24][25] has critical impacts on the proactive operation of the network protection. The existing approaches are short of a self-controllable mechanism thus an appropriate security model has been presented in this paper.…”
Section: Discussionmentioning
confidence: 99%
“…Quantitative evaluation for computer network security [21][22][23][24][25] has critical impacts on the proactive operation of the network protection. The existing approaches are short of a self-controllable mechanism thus an appropriate security model has been presented in this paper.…”
Section: Discussionmentioning
confidence: 99%