4.5 Article

PAC-FIT: An efficient privacy preserving access control scheme for fog-enabled IoT

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Theory & Methods

CCA-secure ABE with outsourced decryption for fog computing

Cong Zuo et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

An efficient access control scheme with outsourcing capability and attribute update for fog computing

Peng Zhang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Information Systems

User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage

Jiguo Li et al.

IEEE SYSTEMS JOURNAL (2018)

Article Computer Science, Information Systems

Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing

Jiguo Li et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2017)

Article Computer Science, Theory & Methods

An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing

Shulan Wang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Theory & Methods

Attribute-Based Data Sharing Scheme Revisited in Cloud Computing

Shulan Wang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Information Systems

Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing

Xin Dong et al.

COMPUTERS & SECURITY (2014)

Article Computer Science, Artificial Intelligence

Improving Security and Efficiency in Attribute-Based Data Sharing

Junbeom Hur

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2013)

Article Computer Science, Theory & Methods

Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems

Junbeom Hur et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2011)

Proceedings Paper Computer Science, Information Systems

Ciphertext-policy attribute-based encryption

John Bethencourt et al.

2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS (2007)