Related references
Note: Only part of the references are listed.Lattice-Based Public Key Searchable Encryption from Experimental Perspectives
Rouzbeh Behnia et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)
IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks
Mohammed Ramadan et al.
MOBILE NETWORKS & APPLICATIONS (2020)
An efficient certificateless public key cryptography with authorized equality test in IIoT
Rashad Elhabob et al.
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2020)
Cloud and IoT-based emerging services systems
Sugam Sharma et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)
Internet of Things: information security challenges and solutions
Natalia Miloslavskaya et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)
Attribute-Based Privacy-Preserving Data Sharing for Dynamic Groups in Cloud Computing
Hu Xiong et al.
IEEE SYSTEMS JOURNAL (2019)
Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing
Hu Xiong et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)
An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid
Nabeil Eltayieb et al.
JOURNAL OF SYSTEMS ARCHITECTURE (2019)
Efficient searchable public key encryption against keyword guessing attacks for cloud-based EMR systems
Yang Lu et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)
Efficient Certificateless Public Key Cryptography With Equality Test for Internet of Vehicles
Rashad Elhabob et al.
IEEE ACCESS (2019)
Authorized Equality Test on Identity-Based Ciphertexts for Secret Data Sharing via Cloud Storage
Hongbo Li et al.
IEEE ACCESS (2019)
Server-Aided Attribute-Based Signature With Revocation for Resource-Constrained Industrial-Internet-of-Things Devices
Hui Cui et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)
Efficient Identity-Based Encryption Scheme with Equality Test in Smart City
Libing Wu et al.
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING (2018)
Efficient and secure identity-based encryption scheme with equality test in cloud computing
Libing Wu et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)
Security and Privacy for Cloud-Based IoT: Challenges, Countermeasures, and Future Directions
Jun Zhou et al.
IEEE COMMUNICATIONS MAGAZINE (2017)
Security and Privacy in Smart City Applications: Challenges and Solutions
Kuan Zhang et al.
IEEE COMMUNICATIONS MAGAZINE (2017)
Verifiable Public Key Encryption Scheme With Equality Test in 5G Networks
Yan Xu et al.
IEEE ACCESS (2017)
Efficient public key encryption with revocable keyword search in cloud computing
Jianhong Zhang et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2016)
Semi-generic construction of public key encryption and identity-based encryption with equality test
Hyung Tae Lee et al.
INFORMATION SCIENCES (2016)
Identity-based encryption with outsourced equality test in cloud computing
Sha Ma
INFORMATION SCIENCES (2016)
PKE-AET: Public Key Encryption with Authorized Equality Test
Kaibin Huang et al.
COMPUTER JOURNAL (2015)
Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization
Sha Ma et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)
Principles for Engineering IoT Cloud Systems
Hong-Linh Truong et al.
IEEE CLOUD COMPUTING (2015)
Public Key Encryption with Delegated Equality Test in a Multi-User Setting
Sha Ma et al.
COMPUTER JOURNAL (2015)
Internet of Things (IoT): A vision, architectural elements, and future directions
Jayavardhana Gubbi et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2013)
Introduction to Industrial Control Networks
Brendan Galloway et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2013)
Security and Privacy in Cloud Computing
Zhifeng Xiao et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2013)
Smart Grid - The New and Improved Power Grid: A Survey
Xi Fang et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2012)
Public key encryption supporting plaintext equality test and user-specified authorization
Qiang Tang
SECURITY AND COMMUNICATION NETWORKS (2012)
The Internet of Things: A survey
Luigi Atzori et al.
COMPUTER NETWORKS (2010)
VEHICLE AD HOC NETWORKS: APPLICATIONS AND RELATED TECHNICAL ISSUES
Yasser Toor et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2008)
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
Michel Abdalla et al.
JOURNAL OF CRYPTOLOGY (2008)