4.6 Article

A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Automation & Control Systems

An Industrial Network Intrusion Detection Algorithm Based on Multifeature Data Clustering Optimization Model

Wei Liang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Artificial Intelligence

Wireless sensor network intrusion detection system based on MK-ELM

Wenjie Zhang et al.

SOFT COMPUTING (2020)

Article Computer Science, Information Systems

Deep Reinforcement Learning for Resource Protection and Real-Time Detection in IoT Environment

Wei Liang et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Automation & Control Systems

Secure Data Storage and Recovery in Industrial Blockchain Network Environments

Wei Liang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Theory & Methods

Traceable-then-revocable ciphertext-policy attribute-based encryption scheme

Zhenhua Liu et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Information Systems

Efficient Ciphertext-Policy Attribute-Based Online/Offline Encryption with User Revocation

Haiying Ma et al.

SECURITY AND COMMUNICATION NETWORKS (2019)

Article Computer Science, Information Systems

Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation

Shengmin Xu et al.

INFORMATION SCIENCES (2019)

Article Computer Science, Information Systems

Security-level switchable attribute-based encryption under the strictly weaker assumption family

Ge Song et al.

INFORMATION SCIENCES (2019)

Article Automation & Control Systems

A Secure FaBric Blockchain-Based Data Transmission Technique for Industrial Internet-of-Things

Wei Liang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)

Article Computer Science, Information Systems

An Efficient and Safe Road Condition Monitoring Authentication Scheme Based on Fog Computing

Mingming Cui et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

Key-policy attribute-based encryption against continual auxiliary input leakage

Jiguo Li et al.

INFORMATION SCIENCES (2019)

Article Computer Science, Information Systems

EduRSS: A Blockchain-Based Educational Records Secure Storage and Sharing Scheme

Hongzhi Li et al.

IEEE ACCESS (2019)

Proceedings Paper Computer Science, Information Systems

An Attribute Revocable CP-ABE Scheme

Guangli Xiang et al.

2019 SEVENTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD) (2019)

Article Computer Science, Information Systems

Constant Size Ciphertext Distributed CP-ABE Scheme With Privacy Protection and Fully Hiding Access Structure

Yichen Zhang et al.

IEEE ACCESS (2019)

Article Computer Science, Hardware & Architecture

White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively

Jianting Ning et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2018)

Article Computer Science, Theory & Methods

Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme

Wei Dai et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Hardware & Architecture

Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating

Zechao Liu et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Artificial Intelligence

Improving file locality in multi-keyword top-k search based on clustering

Lanxiang Chen et al.

SOFT COMPUTING (2018)

Article Computer Science, Information Systems

Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control

Yinghui Zhang et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Information Systems

Generic user revocation systems for attribute-based encryption in cloud storage

Genlang Chen et al.

FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING (2018)

Proceedings Paper Computer Science, Theory & Methods

Attribute Based Encryption for Secure Access to Cloud Based EHR Systems

Maithilee Joshi et al.

PROCEEDINGS 2018 IEEE 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD) (2018)

Article Computer Science, Artificial Intelligence

DMRS: an efficient dynamic multi-keyword ranked search over encrypted cloud data

Lanxiang Chen et al.

SOFT COMPUTING (2017)

Proceedings Paper Computer Science, Information Systems

Multi-authority attribute-based encryption access control scheme with hidden policy and constant length ciphertext for cloud storage

Fan Yundong et al.

2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC) (2017)

Article Computer Science, Theory & Methods

White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes

Jianting Ning et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Information Systems

Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation

Yanfeng Shi et al.

INFORMATION SCIENCES (2015)

Article Computer Science, Hardware & Architecture

Arbitrary-State Attribute-Based Encryption with Dynamic Membership

Chun-I Fan et al.

IEEE TRANSACTIONS ON COMPUTERS (2014)

Article Computer Science, Theory & Methods

White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures

Zhen Liu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2013)

Proceedings Paper Computer Science, Artificial Intelligence

A Tree-based CP-ABE Scheme with Hidden Policy Supporting Secure Data Sharing in Cloud Computing

Runhua Xu et al.

2013 INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD) (2013)

Article Computer Science, Theory & Methods

Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems

Junbeom Hur et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2011)

Proceedings Paper Computer Science, Information Systems

Ciphertext-policy attribute-based encryption

John Bethencourt et al.

2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS (2007)