يعرض 1 - 20 نتائج من 61 نتيجة بحث عن '"registration-based"', وقت الاستعلام: 0.49s تنقيح النتائج
  1. 1
    Academic Journal
  2. 2
    Academic Journal
  3. 3
    Academic Journal

    المؤلفون: Magnin Vergés, Milagros

    المصدر: Revista Iberoamericana de la Propiedad Intelectual; No. 17 (2022); 139-201 ; Revista Iberoamericana de la Propiedad Intelectual; Núm. 17 (2022); 139-201 ; Revista Iberoamericana de la Propiedad Intelectual; n. 17 (2022); 139-201 ; 2422-569X ; 10.26422/RIPI.2022.1700

    وصف الملف: application/pdf; application/epub+zip

  4. 4
    Academic Journal

    المساهمون: School of Mechanical Engineering Shanghai Jiao Tong University, Shanghai Jiao Tong University Shanghai, School of Biomedical Engineering, Shanghai Jiao Tong University, Gestes Medico-chirurgicaux Assistés par Ordinateur (TIMC-GMCAO), Translational Innovation in Medicine and Complexity / Recherche Translationnelle et Innovation en Médecine et Complexité - UMR 5525 (TIMC), VetAgro Sup - Institut national d'enseignement supérieur et de recherche en alimentation, santé animale, sciences agronomiques et de l'environnement (VAS)-Centre National de la Recherche Scientifique (CNRS)-Université Grenoble Alpes (UGA)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP), Université Grenoble Alpes (UGA)-VetAgro Sup - Institut national d'enseignement supérieur et de recherche en alimentation, santé animale, sciences agronomiques et de l'environnement (VAS)-Centre National de la Recherche Scientifique (CNRS)-Université Grenoble Alpes (UGA)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP), Université Grenoble Alpes (UGA), PHC CAI YUANPEI (41366SA), ANR CAMI labex, ANR MIAI 3IA, Région Auvergne Rhône-Alpes (projet ProNavIA), National Natural Science Foundation of CHina, The Foundation of Science and Technology Commisionn of Shanghai Municipality, Shanghai Jiao Tong University on Medical and Technological Joint Research, Hospitl Clinical Research Shanghai, ANR-11-LABX-0004,CAMI,Gestes Médico-Chirurgicaux Assistés par Ordinateur(2011), ANR-19-P3IA-0003,MIAI,MIAI @ Grenoble Alpes(2019)

    المصدر: ISSN: 0094-2405.

  5. 5
    Academic Journal

    المؤلفون: Chun Zhou, Wenyu Zhou, Jiajun Lu

    المصدر: Sustainability; Volume 13; Issue 20; Pages: 11365

    جغرافية الموضوع: agris

    وصف الملف: application/pdf

  6. 6
    Conference

    المساهمون: Glaeser, N., Kolonelos, D., Malavolta, G., Rahimi, A.

    وصف الملف: ELETTRONICO

    Relation: ispartofbook:CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security; 30th ACM SIGSAC Conference on Computer and Communications Security, CCS 2023; numberofpages:15; https://hdl.handle.net/11565/4070135

  7. 7
    Academic Journal
  8. 8
    Academic Journal

    المساهمون: Universitat Oberta de Catalunya (UOC)

    وصف الملف: application/pdf; application/vnd.openxmlformats-officedocument.wordprocessingml.document

    Relation: Moccia, M., Prados, F., Filippi, M., Rocca, M.A., Valsasina, P., Brownlee, W.J., Zecca, C., Gallo, A., Rovira, A., Gass, A., Palace, J., Lukas, C., Vrenken, H., Ourselin, S., Gandini Wheeler-Kinshott, C., Ciccarelli, O. & Barkhof, F. (2019). Longitudinal spinal cord atrophy in multiple sclerosis using the generalized boundary shift integral. Annals of Neurology, 86(5), 704-713. doi:10.1002/ana.25571; 01GI1601; 01GI0914; http://hdl.handle.net/10609/102406

  9. 9
    Academic Journal

    المصدر: Pacific-Basin Finance Journal

    وصف الملف: application/pdf

    Relation: https://eprints.qut.edu.au/129238/1/Responsiblescience.pdf; Aman, Hiroyuki, Beekes, Wendy, Berkman, Henk, Bohmann, Marc, Bradbury, Mike, Chapple, Ellie, Chang, Millicent, Clout, Victoria, Faff, Robert, Han, Jianlei, Hillier, David, Hodgson, Allan, Howieson, Bryan, Jona, Jonathan, Linnenluecke, Martina, Loncan, Tiago, McCredie, Bronwyn, Michayluk, Dave, Mroczkowski, Nick, Pan, Zheyao, Patel, Vinay, Podolski, Edward, Soderstrom, Naomi, Smith, Tom, Tanewski, George, Walsh, Kathleen, Wee, Marvin, & Wright, Sue (2019) Responsible science: Celebrating the 50-year legacy of using a registration-based framework. Pacific-Basin Finance Journal, 56, pp. 129-150.; https://eprints.qut.edu.au/129238/; QUT Business School; School of Accountancy

  10. 10

    المساهمون: Heymans, Stephane, Verdonschot, Job, van Empel, Vanessa, Hazebroek, Mark, Cardiologie, RS: Carim - H02 Cardiomyopathy

    وصف الملف: application/pdf; image/jpeg

  11. 11
    Academic Journal
  12. 12
  13. 13
    Dissertation/ Thesis

    المؤلفون: 高詩蓓, Kao, Shih-Pei

    المساهمون: 曾一凡, Tseng, Yi-Fan

    وصف الملف: 526783 bytes; application/pdf

    Relation: [BF01] Dan Boneh and Matt Franklin. “Identity-based encryption from the Weil pairing”. In: Annual international cryptology conference. Springer. 2001, pp. 213–229. [C07] Melissa Chase. “Multi-authority attribute based encryption”. In: Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007, Ams- terdam, The Netherlands, February 21-24, 2007. Proceedings 4. Springer. 2007, pp. 515–534. [CGW15] Jie Chen, Romain Gay, and Hoeteck Wee. “Improved dual system ABE in prime-order groups via predicate encodings”. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer. 2015, pp. 595–624. [DH22] Whitfield Diffie and Martin E Hellman. “New directions in cryptography”. In: Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman. 2022, pp. 365–390. [DN22] Sangjukta Das and Suyel Namasudra. “Multiauthority CP-ABE-based ac- cess control model for IoT-enabled healthcare infrastructure”. In: IEEE Transactions on Industrial Informatics 19.1 (2022), pp. 821–829. [DP23] Pratish Datta and Tapas Pal. “Registration-Based Functional Encryption.” In: IACR Cryptol. ePrint Arch. 2023 (2023), p. 457. [ESLB21] TP Ezhilarasi et al. “A secure data sharing using IDSS CP-ABE in cloud storage”. In: Advances in Industrial Automation and Smart Manufactur- ing: Select Proceedings of ICAIASM 2019. Springer. 2021, pp. 1073–1085. [FFMM+23] Danilo Francati et al. “Registered (inner-product) functional encryption”. In: International Conference on the Theory and Application of Cryptology and Information Security. Springer. 2023, pp. 98–133. [FWW23] Cody Freitag, Brent Waters, and David J Wu. “How to use (plain) witness encryption: Registered abe, flexible broadcast, and more”. In: Annual In- ternational Cryptology Conference. Springer. 2023, pp. 498–531. [GHMR+19] Sanjam Garg et al. “Registration-based encryption from standard assump- tions”. In: IACR international workshop on public key cryptography. Springer. 2019, pp. 63–93. [GHMR18] Sanjam Garg et al. “Registration-based encryption: removing private-key generator from IBE”. In: Theory of Cryptography: 16th International Con- ference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part I 16. Springer. 2018, pp. 689–718. [GKMR23] Noemi Glaeser et al. “Efficient registration-based encryption”. In: Pro- ceedings of the 2023 ACM SIGSAC Conference on Computer and Com- munications Security. 2023, pp. 1065–1079. [GPSW06] Vipul Goyal et al. “Attribute-based encryption for fine-grained access con- trol of encrypted data”. In: Proceedings of the 13th ACM conference on Computer and communications security. 2006, pp. 89–98. [HCS16] Hanshu Hong, Di Chen, and Zhixin Sun. “A practical application of CP- ABE for mobile PHR system: a study on the user accountability”. In: SpringerPlus 5 (2016), pp. 1–8. [HLWW23] Susan Hohenberger et al. “Registered attribute-based encryption”. In: An- nual International Conference on the Theory and Applications of Crypto- graphic Techniques. Springer. 2023, pp. 511–542. [MKE09] Sascha Müller, Stefan Katzenbeisser, and Claudia Eckert. “Distributed attribute-based encryption”. In: Information Security and Cryptology–ICISC 2008: 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers 11. Springer. 2009, pp. 20–36. [NGD13] Anup R Nimje, VT Gaikwad, and HN Datir. “Attribute-based encryption techniques in cloud computing security: an overview”. In: Int. J. Comput. Trends Technol 4.3 (2013), pp. 419–422. [RSA78] Ronald L Rivest, Adi Shamir, and Leonard Adleman. “A method for ob- taining digital signatures and public-key cryptosystems”. In: Communica- tions of the ACM 21.2 (1978), pp. 120–126. [S85] Adi Shamir. “Identity-based cryptosystems and signature schemes”. In: Advances in Cryptology: Proceedings of CRYPTO 84 4. Springer. 1985, pp. 47–53. [SBB24] Kranthi Kumar Singamaneni, Anil Kumar Budati, and Thulasi Bikku. “An Efficient Q-KPABE Framework to Enhance Cloud-Based IoT Security and Privacy”. In: Wireless Personal Communications (2024), pp. 1–29. [SW05] Amit Sahai and Brent Waters. “Fuzzy identity-based encryption”. In: Ad- vances in Cryptology–EUROCRYPT 2005: 24th Annual International Con- ference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings 24. Springer. 2005, pp. 457–473. [W14] Hoeteck Wee. “Dual system encryption via predicate encodings”. In: The- ory of Cryptography Conference. Springer. 2014, pp. 616–637. [Z11] Yao Zhen. “Privacy-preserving personal health record system using attribute- based encryption”. PhD thesis. Worcester Polytechnic Institute, 2011. [ZRJZ+19] Yang Zhao et al. “An efficient and revocable storage CP-ABE scheme in the cloud computing”. In: Computing 101 (2019), pp. 1041–1065. [ZZGQ23] Ziqi Zhu et al. “Registered ABE via predicate encodings”. In: Interna- tional Conference on the Theory and Application of Cryptology and In- formation Security. Springer. 2023, pp. 66–97.; G0111753146; https://nccur.lib.nccu.edu.tw//handle/140.119/153383; https://nccur.lib.nccu.edu.tw/bitstream/140.119/153383/1/314601.pdf

  14. 14
  15. 15
    Image
  16. 16
    Image
  17. 17
  18. 18
    Image
  19. 19
    Image
  20. 20