4.6 Article

A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Electronic Health Record Sharing Scheme With Searchable Attribute-Based Encryption on Blockchain

Shufen Niu et al.

IEEE ACCESS (2020)

Article Computer Science, Hardware & Architecture

AccConF: An Access Control Framework for Leveraging In-Network Cached Data in the ICN-Enabled Wireless Edge

Satyajayant Misra et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)

Article Chemistry, Analytical

A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain

Kwame Opuni-Boachie Obour Agyekum et al.

SENSORS (2019)

Article Automation & Control Systems

Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-Assisted Industrial IoT

Yinghui Zhang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)

Article Computer Science, Information Systems

A Lightweight Privacy-Preserving Protocol for VANETs Based on Secure Outsourcing Computing

Zhijun Wei et al.

IEEE ACCESS (2019)

Article Computer Science, Hardware & Architecture

Attribute-based Access Control for ICN Naming Scheme

Bing Li et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2018)

Article Automation & Control Systems

Secure Data Storage and Searching for Industrial IoT by Integrating Fog Computing and Cloud Computing

Jun-Song Fu et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Automation & Control Systems

Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things

Mimi Ma et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Engineering, Electrical & Electronic

Blockchain-based efficient privacy preserving and data sharing scheme of content-centric network in 5G

Kai Fan et al.

IET COMMUNICATIONS (2018)

Article Computer Science, Information Systems

A Blockchain-Based Framework for Data Sharing With Fine-Grained Access Control in Decentralized Storage Systems

Shangping Wang et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control

Yinghui Zhang et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Hardware & Architecture

Branch based blockchain technology in intelligent vehicle

Madhusudan Singh et al.

COMPUTER NETWORKS (2018)

Article Computer Science, Theory & Methods

Cost-effective secure E-health cloud system using identity based cryptographic techniques

Xu An Wang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)

Article Computer Science, Hardware & Architecture

S-Kademlia: A trust and reputation method to mitigate a Sybil attack in Kademlia

Riccardo Pecori

COMPUTER NETWORKS (2016)

Article Computer Science, Theory & Methods

Identity-based proxy re-encryption version 2: Making mobile access easy in cloud

Yunya Zhou et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2016)

Article Health Care Sciences & Services

Privacy-Preserving and Secure Sharing of PHR in the Cloud

Leyou Zhang et al.

JOURNAL OF MEDICAL SYSTEMS (2016)

Article Computer Science, Information Systems

Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications

Ala Al-Fuqaha et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2015)

Article Computer Science, Information Systems

Time-based proxy re-encryption scheme for secure data sharing in a cloud environment

Qin Liu et al.

INFORMATION SCIENCES (2014)

Article Computer Science, Theory & Methods

Identity-based data storage in cloud computing

Jinguang Han et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2013)

Article Computer Science, Artificial Intelligence

Improving Security and Efficiency in Attribute-Based Data Sharing

Junbeom Hur

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2013)

Article Computer Science, Information Systems

Hybrid Attribute- and Re-Encryption-Based Key Management for Secure and Scalable Mobile Applications in Clouds

Piotr K. Tysowski et al.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2013)

Article Computer Science, Information Systems

Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers

Guojun Wang et al.

COMPUTERS & SECURITY (2011)