4.6 Article

Identity-based encryption with authorized equivalence test for cloud-assisted IoT

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

Lattice-Based Public Key Searchable Encryption from Experimental Perspectives

Rouzbeh Behnia et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)

Article Computer Science, Hardware & Architecture

IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks

Mohammed Ramadan et al.

MOBILE NETWORKS & APPLICATIONS (2020)

Article Computer Science, Artificial Intelligence

An efficient certificateless public key cryptography with authorized equality test in IIoT

Rashad Elhabob et al.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2020)

Article Computer Science, Information Systems

Cloud and IoT-based emerging services systems

Sugam Sharma et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)

Article Computer Science, Information Systems

Internet of Things: information security challenges and solutions

Natalia Miloslavskaya et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)

Article Computer Science, Information Systems

Attribute-Based Privacy-Preserving Data Sharing for Dynamic Groups in Cloud Computing

Hu Xiong et al.

IEEE SYSTEMS JOURNAL (2019)

Article Computer Science, Theory & Methods

Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing

Hu Xiong et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Hardware & Architecture

An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid

Nabeil Eltayieb et al.

JOURNAL OF SYSTEMS ARCHITECTURE (2019)

Article Computer Science, Information Systems

Efficient searchable public key encryption against keyword guessing attacks for cloud-based EMR systems

Yang Lu et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)

Article Computer Science, Information Systems

Efficient Certificateless Public Key Cryptography With Equality Test for Internet of Vehicles

Rashad Elhabob et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Authorized Equality Test on Identity-Based Ciphertexts for Secret Data Sharing via Cloud Storage

Hongbo Li et al.

IEEE ACCESS (2019)

Article Automation & Control Systems

Server-Aided Attribute-Based Signature With Revocation for Resource-Constrained Industrial-Internet-of-Things Devices

Hui Cui et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Computer Science, Hardware & Architecture

Efficient Identity-Based Encryption Scheme with Equality Test in Smart City

Libing Wu et al.

IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING (2018)

Article Computer Science, Theory & Methods

Efficient and secure identity-based encryption scheme with equality test in cloud computing

Libing Wu et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)

Article Engineering, Electrical & Electronic

Security and Privacy for Cloud-Based IoT: Challenges, Countermeasures, and Future Directions

Jun Zhou et al.

IEEE COMMUNICATIONS MAGAZINE (2017)

Article Engineering, Electrical & Electronic

Security and Privacy in Smart City Applications: Challenges and Solutions

Kuan Zhang et al.

IEEE COMMUNICATIONS MAGAZINE (2017)

Article Computer Science, Information Systems

Verifiable Public Key Encryption Scheme With Equality Test in 5G Networks

Yan Xu et al.

IEEE ACCESS (2017)

Article Computer Science, Information Systems

Efficient public key encryption with revocable keyword search in cloud computing

Jianhong Zhang et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2016)

Article Computer Science, Information Systems

Semi-generic construction of public key encryption and identity-based encryption with equality test

Hyung Tae Lee et al.

INFORMATION SCIENCES (2016)

Article Computer Science, Information Systems

Identity-based encryption with outsourced equality test in cloud computing

Sha Ma

INFORMATION SCIENCES (2016)

Article Computer Science, Hardware & Architecture

PKE-AET: Public Key Encryption with Authorized Equality Test

Kaibin Huang et al.

COMPUTER JOURNAL (2015)

Article Computer Science, Theory & Methods

Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization

Sha Ma et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Information Systems

Principles for Engineering IoT Cloud Systems

Hong-Linh Truong et al.

IEEE CLOUD COMPUTING (2015)

Article Computer Science, Hardware & Architecture

Public Key Encryption with Delegated Equality Test in a Multi-User Setting

Sha Ma et al.

COMPUTER JOURNAL (2015)

Article Computer Science, Theory & Methods

Internet of Things (IoT): A vision, architectural elements, and future directions

Jayavardhana Gubbi et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2013)

Article Computer Science, Information Systems

Introduction to Industrial Control Networks

Brendan Galloway et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2013)

Article Computer Science, Information Systems

Security and Privacy in Cloud Computing

Zhifeng Xiao et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2013)

Article Computer Science, Information Systems

Smart Grid - The New and Improved Power Grid: A Survey

Xi Fang et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2012)

Article Computer Science, Information Systems

Public key encryption supporting plaintext equality test and user-specified authorization

Qiang Tang

SECURITY AND COMMUNICATION NETWORKS (2012)

Article Computer Science, Hardware & Architecture

The Internet of Things: A survey

Luigi Atzori et al.

COMPUTER NETWORKS (2010)

Article Computer Science, Information Systems

VEHICLE AD HOC NETWORKS: APPLICATIONS AND RELATED TECHNICAL ISSUES

Yasser Toor et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2008)

Article Computer Science, Theory & Methods

Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions

Michel Abdalla et al.

JOURNAL OF CRYPTOLOGY (2008)