Proxy

Results: 10994



#Item
1Cryptography / Public-key cryptography / Proxy re-encryption / ID-based encryption / Homomorphic encryption / ElGamal encryption / Chosen-ciphertext attack / Encryption / RSA / Key / Symmetric-key algorithm / Identity-based conditional proxy re-encryption

Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications David Derler1 , Stephan Krenn2 , Thomas Lor¨ unser2 , Sebastian Ramacher1 , 2 Daniel Slamanig , and Christoph Striecks2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-05-03 11:03:06
2Computing / Network performance / Firewall software / System software / Flow control / Explicit Congestion Notification / Information and communications technology / Transmission Control Protocol / Netfilter / Packet loss / Firewall / Communication protocol

Pascal Sprenger Design and Implementation of an ECN Proxy for Performance Improvements in the Internet

Add to Reading List

Source URL: nsg.ee.ethz.ch

Language: English - Date: 2016-11-21 15:52:12
3Computing / Network architecture / Internet / Internet protocols / Secure communication / Internet Standards / Cryptographic protocols / Network protocols / Transmission Control Protocol / Proxy server / Deep packet inspection / Steganography

StegoTorus: A Camouflage Proxy for the Tor Anonymity System Zachary Weinberg,1,2 Jeffrey Wang,3 Vinod Yegneswaran,2 Linda Briesemeister,2 Steven Cheung,2 Frank Wang,3 and Dan Boneh 3 1

Add to Reading List

Source URL: censorbib.nymity.ch

Language: English - Date: 2014-05-19 10:30:48
4Cryptography / Public-key cryptography / Key management / Public key infrastructure / Proxy re-encryption / Identity-based cryptography / Encryption / Symmetric-key algorithm / Key generation / Integrated Encryption Scheme / Hybrid cryptosystem / Cipher

NuCypher: A proxy re-encryption network to empower privacy in decentralized systems Michael Egorov,∗ David Nuñez,† and MacLane Wilkison‡ NuCypher (Dated: June 19, 2018) NuCypher is a decentralized Key Management S

Add to Reading List

Source URL: www.nucypher.com

Language: English
5Public-key cryptography / Cryptography / Homeomorphisms / Homomorphic encryption / Proxy re-encryption / Digital signature / Mathematics

Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation David Derler, Sebastian Ramacher, and Daniel Slamanig April 2017—FC 2017, Sliema, Malta

Add to Reading List

Source URL: david.derler.info

Language: English - Date: 2018-10-15 14:18:42
6Modeling and simulation / Simulation / Computer performance / Benchmark / Big data / Computing / Data / Information

Big data and AI Proxy Benchmarks for Simulation Chen Zheng http://prof.ict.ac.cn ASPLOS 2018, Williamsburg, VA, USA

Add to Reading List

Source URL: prof.ict.ac.cn

Language: English - Date: 2018-04-01 06:23:46
7

PDF Document

Add to Reading List

Source URL: proxy-pubminefi.diffusion.finances.gouv.fr

- Date: 2016-11-24 10:43:41
    8

    PDF Document

    Add to Reading List

    Source URL: proxy-pubminefi.diffusion.finances.gouv.fr

    - Date: 2016-09-15 08:52:27
      9

      PDF Document

      Add to Reading List

      Source URL: proxy-pubminefi.diffusion.finances.gouv.fr

      - Date: 2016-09-15 08:54:04
        10

        ST THOMAS MEDICAL GROUP Consent to proxy access to GP online services Note: If the patient does not have capacity to consent to grant proxy access and proxy access is considered by the practice to be in the patient’s b

        Add to Reading List

        Source URL: www.exeterstudenthealthcentre.co.uk

        Language: English
          UPDATE