Contains code for generation of Points on the Elliptic Curve and performing Proxy ReEncryption using them.
☆18Jan 3, 2019Updated 7 years ago
Alternatives and similar repositories for Proxy-ReEncryption-Elliptical-Curve-Cryptography-ECC-
Users that are interested in Proxy-ReEncryption-Elliptical-Curve-Cryptography-ECC- are comparing it to the libraries listed below
Sorting:
- python prototype of PRE (Proxy Re-encryption) on Cloud storage and sharing☆24Jul 6, 2018Updated 7 years ago
- Proxy Re-Encryption go implementation☆89Apr 5, 2020Updated 5 years ago
- Traceable and Revocable Attribute-based Encryption in Java☆49Dec 5, 2018Updated 7 years ago
- 2D Convolutional KAN Layers with different types of activation functions☆12Sep 29, 2024Updated last year
- This project helps you to record your voice using iPhone.☆30Nov 19, 2012Updated 13 years ago
- Decentralized CP-ABE☆119Jan 14, 2025Updated last year
- ☆25Dec 21, 2018Updated 7 years ago
- 基于hyperledger fabric区块链搭建的医疗病例共享及转诊平台☆32Oct 22, 2022Updated 3 years ago
- 基于FISCO-BCOS区块链的供应链demo,使用node.js构建后端☆10Jan 28, 2021Updated 5 years ago
- ☆10Aug 8, 2022Updated 3 years ago
- Network Traffic Classification with Graph Neural Networks☆11Nov 4, 2023Updated 2 years ago
- 拜占庭算法 PBFT的JAVA版本实现,在PBFT算法实现同时加入了以下几个功能 1、动态加减公式节点 2、发起升级请求 3、数据同步☆10Jun 15, 2022Updated 3 years ago
- multi-authority attribute based encryption☆43Nov 20, 2020Updated 5 years ago
- 🎉🎨 Papers, CODE, Datasets for Self-Supervised Learning (SSL)☆12Feb 27, 2024Updated 2 years ago
- Dataset from Linux Raspian VMs and devices with auditd logs capturing various container escape and attacks.☆15Jul 30, 2022Updated 3 years ago
- A Machine Learning based tool for identifying P2P (Peer To Peer) Bot-Nets using network traffic analysis, as well as detect the hosts inv…☆12Jan 4, 2023Updated 3 years ago
- Ring-Signature using secp256k1 in Solidity☆13Jul 6, 2018Updated 7 years ago
- Basic implementation of Borromean ring signatures in Python, for learning☆15Dec 14, 2017Updated 8 years ago
- Re-encryption by proxy and (additive) homomorphic encryption☆13Oct 10, 2018Updated 7 years ago
- DHG-Bench is a comprehensive benchmark for Deep Hypergraph Learning☆31Updated this week
- 2020 西湖论剑恶意流量检测实现代码☆12Dec 20, 2022Updated 3 years ago
- 基于图挖掘的网络异常检测系统的研究与实现☆11Sep 24, 2018Updated 7 years ago
- ☆12Jan 26, 2019Updated 7 years ago
- convGRU based autoencoder for unsupervised & spatial-temporal anomaly detection in computer network (PCAP) traffic.☆18Feb 16, 2024Updated 2 years ago
- 通过对Hyperledger Fabric -> fabric-samples 中的一个NodeJS示例应用程序(balance-transfer)的分析,来演示基于fabric-sdk-node的使用☆13Dec 29, 2018Updated 7 years ago
- Intrusion Detection System using Machine Learning and Ensemble Techniques☆19May 14, 2021Updated 4 years ago
- A file encryption application based on the Identity-based proxy re-encryption☆16Nov 23, 2018Updated 7 years ago
- 基于PCAP的网络入侵检测系统☆16Jan 19, 2022Updated 4 years ago
- 全国人社窗口单位业务技能——在线自动答题~基于PysimpleGUI实现☝️☝️☝️内置独家题库,无需自己下载,目前已实现自动「日日学」,「周周练」☄️ 请下载最新的release:https://github.com/ExcaliburEX/AutomaticOnline…☆20May 23, 2023Updated 2 years ago
- 📙 Heavily optimized cryptography algorithms for embedded devices, packaged for iOS.☆11Oct 24, 2018Updated 7 years ago
- 主动FTP客户端的实现☆15Aug 25, 2017Updated 8 years ago
- ☆19Updated this week
- 多方安全计算技术&联邦学习相关/Multi party security computing technology federated learning☆18Feb 18, 2024Updated 2 years ago
- Code for "Graph Contrastive Learning with Cohesive Subgraph Awareness"☆20Feb 29, 2024Updated 2 years ago
- Allows multiple parties to agree on transactions before execution. Forked from Gnosis multisig repository.☆22Oct 20, 2018Updated 7 years ago
- Use paillier in FISCO BCOS☆69Dec 12, 2023Updated 2 years ago
- Java implementation of an attribute-based encryption scheme☆18Apr 21, 2016Updated 9 years ago
- FedMSE: Semi-supervised federated learning approach for IoT network intrusion detection☆25Apr 1, 2025Updated 11 months ago
- Cluster Support Vector Data Description☆20Apr 20, 2017Updated 8 years ago