Luci841 / FragMonster-GTA-V
☆17Updated this week
Related projects: ⓘ
- ☆23Updated this week
- ☆25Updated this week
- ☆23Updated this week
- ☆25Updated this week
- c++基础☆6Updated 4 years ago
- Implementations of different Consensus Algorithms for blockchains☆20Updated 6 years ago
- Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation.☆14Updated last year
- JPBC_Optimize_IBE by JPBC☆22Updated 5 years ago
- Delegated proof of Stake☆9Updated last year
- 一个使用CPABE的文件加密传输分享CS系统☆11Updated 5 years ago
- It is a web developement project, Used for sharing personal Health Records on cloud servers using AES encryption algorithm with Multi Aut…☆16Updated 8 years ago
- Simulating communication in a VANET (Vehicular Ad-Hoc Networks), and implementing access control, using concepts from blockchains, mainta…☆11Updated 2 years ago
- ☆204Updated 9 months ago
- ☆7Updated 3 years ago
- ☆17Updated this week
- This code is algorithmic reproduction of A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy P…☆18Updated last year
- 国标随机性检测规范Java实现☆9Updated 5 years ago
- ☆11Updated 4 years ago
- A process for key negotiation using ECDH (Elliptic-Curve Diffie–Hellman)☆33Updated 4 years ago
- 《一种面向区块链的优化PBFT共识算法》基础源代码☆60Updated last year
- ☆55Updated this week
- Implementation of searchable symmetric encryption scheme (SSE-1 in [CGKO06]) in pure Python☆22Updated 2 years ago
- Elgamal Encryption using Elliptic Curve Cryptography in Python 2.7☆12Updated 5 years ago
- 基于访问树构造的属性基加密☆52Updated 2 years ago
- This is a Sharding Simulator to study blockchain scalability.☆35Updated 2 years ago
- Encrypting User Data with Attribute-Based Encryption Using Privacy Policies☆8Updated 6 years ago
- An implementation of a decentralized voting scheme on top of the Ethereum blockchain using linkable ring signatures and threshold keys.☆33Updated 4 years ago
- Blockchain server, mining server and proof-of-work, python power☆13Updated 4 years ago
- Outsourcing Decentralized CP-ABE☆10Updated 2 years ago
- Authentication of Sensor nodes is a major security issues in WSN. Lack of authentication yields security attacks like man in middle attac…☆9Updated 6 years ago
- A group signature library for FISCO BCOS☆29Updated last year