Works matching DE "PROXY servers"


Results: 100
    1
    2
    3
    4
    5
    6
    7

    UNIFORM SOLUTIONS FOR WEB SERVICES.

    Published in:
    Studia Universitatis Babes-Bolyai, Informatica, 2012, v. 57, n. 3, p. 13
    By:
    • BOIAN, FLORIAN;
    • JANCSO, BEATA
    Publication type:
    Article
    8
    9
    10
    11
    12
    13
    14

    Power Saving Proxies for Web Servers.

    Published in:
    Computer Journal, 2020, v. 63, n. 2, p. 179, doi. 10.1093/comjnl/bxz081
    By:
    • O'Dwyer, Karl J;
    • Creedon, Eoin;
    • Purcell, Mark;
    • Malone, David
    Publication type:
    Article
    15

    Non-transferable Proxy Re-encryption.

    Published in:
    Computer Journal, 2019, v. 62, n. 4, p. 490, doi. 10.1093/comjnl/bxy096
    By:
    • Guo, Hui;
    • Zhang, Zhenfeng;
    • Xu, Jing;
    • An, Ningyu
    Publication type:
    Article
    16
    17

    'Proxies' and Cyberspace.

    Published in:
    Journal of Conflict & Security Law, 2016, v. 21, n. 3, p. 383, doi. 10.1093/jcsl/krw015
    By:
    • Maurer, Tim
    Publication type:
    Article
    18
    19
    20

    Load balancing mechanism for clustered PMIPv6 protocol.

    Published in:
    EURASIP Journal on Wireless Communications & Networking, 2018, v. 2018, n. 1, p. 1, doi. 10.1186/s13638-018-1137-y
    By:
    • Ghaleb, Safwan M.;
    • Subramaniam, Shamala;
    • Zukarnain, Zuriati Ahmed;
    • Muhammed, Abdullah
    Publication type:
    Article
    21

    Efficient quantum multi-proxy signature.

    Published in:
    Quantum Information Processing, 2019, v. 18, n. 2, p. 1, doi. 10.1007/s11128-018-2169-2
    By:
    • Qin, Huawang;
    • Tang, Wallace K. S.;
    • Tso, Raylin
    Publication type:
    Article
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31
    32
    33
    34
    35
    36
    37
    38
    39
    40

    支持撤销的外包加解密 CP-ABE 方案.

    Published in:
    Application Research of Computers / Jisuanji Yingyong Yanjiu, 2020, v. 37, n. 11, p. 3373, doi. 10.19734/j.issn.1001-3695.2019.06.0295
    By:
    • 欧毓毅;
    • 汪倩倩;
    • 顾国生
    Publication type:
    Article
    41
    42

    Survey of proxy re-signature technology.

    Published in:
    Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 1, p. 23, doi. 10.3969/j.issn.1001-3695.2014.01.004
    By:
    • CHEN Liang;
    • CHEN Xing-yuan;
    • SUN Yi;
    • DU Xue-hui
    Publication type:
    Article
    43
    44
    45
    46
    47

    High-rate measurement-device-independent quantum cryptography.

    Published in:
    Nature Photonics, 2015, v. 9, n. 6, p. 397, doi. 10.1038/nphoton.2015.83
    By:
    • Pirandola, Stefano;
    • Ottaviani, Carlo;
    • Spedalieri, Gaetana;
    • Weedbrook, Christian;
    • Braunstein, Samuel L.;
    • Lloyd, Seth;
    • Gehring, Tobias;
    • Jacobsen, Christian S.;
    • Andersen, Ulrik L.
    Publication type:
    Article
    48
    49
    50