相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。An Industrial Network Intrusion Detection Algorithm Based on Multifeature Data Clustering Optimization Model
Wei Liang et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)
Wireless sensor network intrusion detection system based on MK-ELM
Wenjie Zhang et al.
SOFT COMPUTING (2020)
Deep Reinforcement Learning for Resource Protection and Real-Time Detection in IoT Environment
Wei Liang et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
Secure Data Storage and Recovery in Industrial Blockchain Network Environments
Wei Liang et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)
Traceable-then-revocable ciphertext-policy attribute-based encryption scheme
Zhenhua Liu et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)
Efficient Ciphertext-Policy Attribute-Based Online/Offline Encryption with User Revocation
Haiying Ma et al.
SECURITY AND COMMUNICATION NETWORKS (2019)
Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation
Shengmin Xu et al.
INFORMATION SCIENCES (2019)
Security-level switchable attribute-based encryption under the strictly weaker assumption family
Ge Song et al.
INFORMATION SCIENCES (2019)
A Secure FaBric Blockchain-Based Data Transmission Technique for Industrial Internet-of-Things
Wei Liang et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)
An Efficient and Safe Road Condition Monitoring Authentication Scheme Based on Fog Computing
Mingming Cui et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
Key-policy attribute-based encryption against continual auxiliary input leakage
Jiguo Li et al.
INFORMATION SCIENCES (2019)
EduRSS: A Blockchain-Based Educational Records Secure Storage and Sharing Scheme
Hongzhi Li et al.
IEEE ACCESS (2019)
An Attribute Revocable CP-ABE Scheme
Guangli Xiang et al.
2019 SEVENTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD) (2019)
Constant Size Ciphertext Distributed CP-ABE Scheme With Privacy Protection and Fully Hiding Access Structure
Yichen Zhang et al.
IEEE ACCESS (2019)
White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively
Jianting Ning et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2018)
Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme
Wei Dai et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)
Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating
Zechao Liu et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)
Improving file locality in multi-keyword top-k search based on clustering
Lanxiang Chen et al.
SOFT COMPUTING (2018)
Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control
Yinghui Zhang et al.
IEEE INTERNET OF THINGS JOURNAL (2018)
Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage
Shangping Wang et al.
PLOS ONE (2018)
Generic user revocation systems for attribute-based encryption in cloud storage
Genlang Chen et al.
FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING (2018)
Attribute Based Encryption for Secure Access to Cloud Based EHR Systems
Maithilee Joshi et al.
PROCEEDINGS 2018 IEEE 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD) (2018)
DMRS: an efficient dynamic multi-keyword ranked search over encrypted cloud data
Lanxiang Chen et al.
SOFT COMPUTING (2017)
Multi-authority attribute-based encryption access control scheme with hidden policy and constant length ciphertext for cloud storage
Fan Yundong et al.
2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC) (2017)
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes
Jianting Ning et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)
Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation
Yanfeng Shi et al.
INFORMATION SCIENCES (2015)
Arbitrary-State Attribute-Based Encryption with Dynamic Membership
Chun-I Fan et al.
IEEE TRANSACTIONS ON COMPUTERS (2014)
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures
Zhen Liu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2013)
A Tree-based CP-ABE Scheme with Hidden Policy Supporting Secure Data Sharing in Cloud Computing
Runhua Xu et al.
2013 INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD) (2013)
Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems
Junbeom Hur et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2011)
Ciphertext-policy attribute-based encryption
John Bethencourt et al.
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS (2007)