Zadka, 2019
| Publication | Publication Date | Title |
|---|---|---|
| CN111095256B (en) | Securely executing smart contract operations in a trusted execution environment | |
| US12355864B1 (en) | Trust framework against systematic cryptographic breach | |
| TWI709314B (en) | Data processing method and device | |
| Lozupone | Analyze encryption and public key infrastructure (PKI) | |
| RU2718689C2 (en) | Confidential communication control | |
| JP6528008B2 (en) | Personal Device Security Using Elliptic Curve Cryptography for Secret Sharing | |
| US10805087B1 (en) | Code signing method and system | |
| CN102577229B (en) | Key certification in one round trip | |
| US8527769B2 (en) | Secure messaging with read-undeniability and deletion-verifiability | |
| Zhou et al. | EverSSDI: blockchain-based framework for verification, authorisation and recovery of self-sovereign identity using smart contracts | |
| WO2018045568A1 (en) | Access control method oriented to cloud storage service platform and system thereof | |
| Garg et al. | Comparative analysis of cloud data integrity auditing protocols | |
| CN106341236A (en) | Access control method facing cloud storage service platform and system thereof | |
| Hussein et al. | A survey of cryptography cloud storage techniques | |
| Diomedous et al. | Practical password hardening based on TLS | |
| CN107360252A (en) | A kind of Data Access Security method that isomery cloud domain authorizes | |
| Purushothama et al. | Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud | |
| Zadka | Cryptography | |
| JP7385025B2 (en) | Execution of Entity-Specific Cryptographic Code in a Cryptographic Coprocessor | |
| Park | Security requirements for multimedia archives | |
| Soman et al. | Analysis of hybrid data security algorithms for cloud | |
| Arvin S. Lat et al. | SOUL System: secure online USB login system | |
| Easttom | SSL/TLS | |
| Shah et al. | Third party public auditing scheme for security in cloud storage | |
| Reddy et al. | Data Storage on Cloud using Split-Merge and Hybrid Cryptographic Techniques |